Wireless Network Solutions

Wireless configuration is one of the weakest chain in today's network communications.

BG-Tek analysis your needs and produces solutions for provision and configuration of applications and equipment necessary to ensure your wireless network security. BG-Tek works with technology suppliers which are experts in their field for wireless network configuration and AP positioning regarding provision of security, guest network management and Hotspot applications, identifying and preventing damages which may arise from wireless networks.

Wireless Network Security Solutions

  • Hotspot configuration
  • AP product selection, configuration and positioning
  • Wireless Network Security Tests
  • Wireless Network Analysis
  • Management of configuration of AP Controller and VLAN
  • Wireless Intrusion Protection System and Wireless Intrusion Detection System (WIPS, WIDS)

The Aim of the White Hat Hacker training

White hat hacker training is an advanced level information security training. Contrary to other theoretical trainings, these courses are prepared with the idea that “security cannot be ensured without knowing the methods of attack”, by exemplifying the methods of blackhat hackers. The purpose of White Hat Hacker Training is to ensure that participants are specialized in Information Security and to train specialists who can carry out Security Tests (Pentester).

Pre-requisites for getting a white hat hacker training

Basic Linux, system and network information are required to attend white hat hacker training. White Hat Hacker training is prepared for specialists working in the field of system, network managers and information security.

  • Preliminary Information
  • Information Gathering Methods
  • Scanning
  • Getting Information from Services
  • Hacking Systems
  • Metasploit
  • Virus, Worm and Trojans
  • Sniffers
  • Social Engineering
  • DOS
  • Session Hijacking
  • Hacking Web Servers
  • Web Application Vulnerabilities
  • SQL Injection
  • Wireless Networks
  • Firewall & Honeypot and IDS
  • Buffer Overflow
  • Cryptography - Encryption
  • Pentest
  • Training Period : 40 hours