Wireless LAN Security Training

Wireless LAN Security Training


Wireless LAN Security Training Course - Public Courses and Onsite

This Wireless LAN Security Training course targets experienced networking professionals who wish to gain critical skills in wireless networking security, including how hackers attack networks and the means for preventing them from doing so. With the burgeoning growth of wireless LAN installations, all IT professionals must become knowledgeable about security – wireless security in particular System, network and security administrators. Individuals or organizations interested in new prevention, detection, or incident response technologies. University, government, or military

The purpose of the Wireless LAN Security Training course is to give you a full understanding of what wireless (802.11) networks are, how they work, how people find them and exploit them, and how they can be secured. This Wireless LAN Security Training course is based on real world examples, solutions, and deployments. All material is developed and taught by individuals with extensive experience in wireless security research.

Customize It:

With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.

Audience/Target Group

• Information security analysts
• IT infrastructure security specialists
• People who decide which information technology and cybersecurity products to acquire for their organization

Wireless LAN Security TrainingRelated Courses:

Duration: 3-4 days

Skilled Gained:

• Understanding 802.11 Security Threats
• Security Management, Wireless LAN Intrusion and Policy
• Overview of security software and protocols for wireless LANs
• Exploring of the security weaknesses of and threats to wireless LANs
• Overview of implementation of the best and latest security techniques and mechanisms
• Implementation of WEP, WPA, WPA2, 802.11i and 802.1x

Course Content:

Wireless LANs Security Basics
•Why Is 802.11 Vulnerable to Attack?
•Risk Assessment
•Intermediate Security Measures
•Radio Transmission
•Inherent Insecurity
•11, 802.11a, 802.11b and 802.11g
•Ad Hoc vs. Infrastructure Mode
•Wired Equivalent Privacy (WEP)
•64-bit and 128-bit WEP encryption
•WEP and RC4 stream cipher
•Initialization vector (IV)
•EAP Authentication Types
•LEAP Authentication
•Other Authentication Methods
•Transportation Layer Security
•A Comparison of Security Methods
•Wi-Fi Protected Access (WPA)

Wireless LANs Attacks and Risks
•An Example Network
•Denial-of-Service Attacks
•Wireless Risks
•Threat Analysis & Hacking
•Classification of Attacks
•Attacks Without Keys
•Man-in-the-Middle Attack (Modification)
•Attacks on the Keys
•One-time Passwords
•Burying the Keys
•Wireless Attacks
•Attacking the Keys Through Brute Force
•Dictionary Attacks (Dictionary-Building or Table Attacks)
•Algorithmic Attacks
•Target profiling
•Physical security
•Social engineering
•Wireless bridges
•Sniffing and stealing
•Malicious data insertion
•Denial of Service (DoS)
•Peer-to-peer hacking
•Unauthorized control

Maximizing Wireless Security
•Common Sense Solutions
•Components of WPA
•WPA Algorithms
•WPA Pre-Shared Key
•WPA2 (Wi-Fi Protected Access 2) Security
•WPA and WPA2
•IEEE 802.11i (RSN) – Enhanced Wireless Security
•11i vs. WPA2
•1x Authentication and 802.11i
•VPN over 802.11

Rudimentary security measures
•MAC filters
•Static WEP
•Default configurations
•Firmware upgrades
•Physical security
•Periodic inventory

Station Security
•Client Security Goals
•Audit Logging
•Security Updates
•FreeBSD Station Security
•Linux Station Security
•OpenBSD Station Security
•Mac OS X Station Security
•Windows Station Security
•Access Point Security
•Setting Up an Access Point
•General Access Point Security
•Up a Linux Access Point
•Setting Up a FreeBSD Access Point
•Setting Up an OpenBSD Access Point

Gateway Security
•Gateway Architecture
•Secure Installation
•Firewall Rule Creation
•Rate Limiting
•Static ARP
•Authentication and Encryption
•IPsec VPN
•IEEE 802.1X – Port Based Network Access Control

Intermediate Security Measures
•Rogue equipment
•Cell sizing
•Protocol filters
•Discovery protocols
•Wireless segment configuration
•Remove vulnerabilities
•Client security
•IP Services

Advanced Security Measures
•Wireless security policy
•Authentication & encryption
•Wireless DMZ and VLANs
•Authenticated DHCP
•Traffic patterns
•Wireless LAN Auditing Tools
•Discovery tools
•Password crackers
•Share enumerators
•Network management and control
•Wireless protocol analyzers
•Manufacturer defaults
•Password sniffers
•Antennas and WLAN equipment
•OS fingerprinting and port scanning
•Application sniffers
•Networking utilities
•Network discovery and management
•Hijacking users
•Jamming tools
•WEP crackers
•Operating system defaults

Hardware & Software Solutions
•RADIUS with AAA Support
•RADIUS Details
•Static and Dynamic WEP and
•1X Key Management
•Extensible Authentication Protocol (EAP)
•Encryption Schemes
•MobileIP VPN Solutions
•Enterprise Wireless Gateways
•Switches, VLANs, & Hubs
•SSH2 Tunneling & Port

Prevention & Countermeasures
•CCM block diagram
•Intrusion detection
•WEP attacks
•WEP key recovery
•Weaknesses in the Key Scheduling Algorithm for RC4
•WPA and WPA attacks
•11i attacks
•1x attacks

Implementation and Management
•Design and implementation
•Equipment configuration and placement
•Interoperability and layering
•Security management

Wireless LAN Auditing Tools
•Discovery tools
•Password crackers
•Share enumerators
•Wireless protocol analyzers
•Manufacturer defaults
•Password sniffers
•Antennas and WLAN equipment
•OS fingerprinting and port scanning
•Application sniffers
•Networking utilities
•Network discovery and management
•Hijacking users
•RF Jamming and Dataflooding tools
•WEP crackers

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment