• Customized Curriculum
    Customized Curriculum

    We are a one stop answer to  make you part of the  ever growing  ICT industry  with our customized   Curriculum.

  • Knowledgeable Facilitators
    Knowledgeable Facilitators

    We have a team of brilliant and experienced trainers  and consultants able to deliver to your satisfaction.

  • We Understand, Advise and Deliver
    We Understand, Advise and Deliver

    We understand the growing need for accredited training  in the corporate industry and towards this end we provide you with necessary Skills .

Futuristic Information Technology Training Services For Mobile Wireless Security

With the proliferation of mobile and wireless technologies into the workplace, IT professionals have quickly realised that the information security "givens" of the wired network no longer apply. As critical data now literally dangles in thin air, new protection strategies and techniques are the order of the day. This workshop will answer questions on how you can overcome wireless insecurity by learning how to defend your Wireless Local Area Network (WLAN), the latest on wireless standards and technologies, wireless authentication options, securing mobile workers in wireless hotspots, protecting your Virtual Private Networks (VPNs) from hackers, RFID technologies and how to secure them and the lowdown on IM Security.

Reasons You Should Attend

  • Examine WLAN technologies, systems and standards.
  • Learn emerging wireless standards and protocols.
  • Critically evaluate remote/wireless e-mail risks and benefits.
  • Understand hardware and software options for war driving
  • Develop skills to overcome interoperability hurdles with wireless products
  • Discover successful approaches to keeping IM and email safe on the road
  • Find out how to select firewalls for corporate and remote wireless environments.
  • Learn strategies for overcoming risks at the boundary between wired and wireless devices
  • Discover the intersection of RFID and wireless applications
  • Understand physical infrastructure considerations for deploying wireless technologies

Course Special Features

  • Targeted Tracks: You will benefit from the expertise of industry front-runners, learn from real-world case studies and leave with everything you need to know to safeguard your wireless networks and devices
  • Tangible Take-Aways will be given to you including useful documents, guidelines and checklists that you can use as a springboard to your own initiatives.
  • Optimum networking opportunities are available through breaks, receptions, and luncheons. You will have the opportunity to talk shop with information security professionals and you will return to the office with new ideas and fresh contacts.

 

Obtain materials in 2 easy ways:

  • At the conference you will receive bound volumes of the conference materials
  • After the conference: download the materials you want from the web with a special access code.

 

Who Should Attend

  • Information Security Officers, Directors and Managers
  • Information Technology Auditors, Managers and Staff
  • Network Security Managers and Administrators
  • Local Area Network Administrators
  • Technical Support Staff
  • System Administrators
  • Others charged with mobile and wireless security responsibilities