Download Interent ExplorerDownload Apple SafariDownload OperaDownload FirefoxDownload Google Chrome

WiFi LAN Operation and Security Training

WiFi LAN Operation and Security Training

WiFi LAN Operation and Security Training:

WiFi LAN Operation and Security Training Course with Hands-on Exercises (Online, Onsite, and Classroom Live)

This WiFi LAN Operation and Security Training course are aimed at those interested in learning WiFi architecture and operation with a particular interest in the security issues, such as those involved in performing security audits of WiFi networks. However, with content adjustment as needed, the course will benefit other audiences as well.

What’s Included?

  • 4 days of WiFi LAN Operation and Security Training Workshop with an expert instructor
  • WiFi LAN Operation and Security Training Electronic Course Guide
  • Certificate of Completion
  • 100% Satisfaction Guarantee


Related Courses

Customize It:

  • Let us know your reason for studying WiFi so we can tailor the WiFi LAN Operation and Security Training course accordingly. The standard course is four days long but can be shortened or expanded as required.
  • We can adjust the emphasis placed on the various topics or build the WiFi LAN Operation and Security Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the WiFi LAN Operation and Security Training course in a manner understandable to lay audiences.

Audience/Target Group

  • Technical personnel interested in Wi-Fi LAN technology, network operation, and network security.


  • Those wishing to take this course should have a background in telecommunications or IT with a basic understanding of data networks.

Course Syllabus:

Part 1: Introduction to IEEE 802.11 and Wi-Fi

  • Wired vs wireless communications
    • Comparison of security challenges
  • Introduction to security attacks and countermeasures
    • Layered security attack methods
    • Shared key and public key cryptography
  • Overview of IEEE 802.11 and Wi-Fi
    • General Architecture
    • Wi-Fi Alliance
    • IEEE 802.11 task groups

Part 2: Wi-Fi Physical (PHY) Layer

  • Range calculations and PHY vulnerabilities
    • Calculating maximum range
    • Eavesdropping range of vulnerability
    • The jamming range of susceptibility
    • Countermeasures
  • Basic modulation methods
    • Modulated signal structure
    • Amplitude, frequency, and phase shift keying
  • Direct sequence spread spectrum (802.11b)
    • DSSS methods
    • Processing gain
    • Complementary code keying (CCK)
  • Advanced modulation methods (802.11g/n)
    • Quadrature Amplitude Modulation (QAM)
    • Orthogonal Frequency Division Multiplexing (OFDM)
    • Performance
  • Advanced antennas and multiple-input multiple-output (MIMO)
    • 802.11n MIMO
    • 802.11n operating modes and performance
  • Error Control
    • Error detection and correction
    • Automatic repeat request

Part 3: Wi-Fi Medium Access Control (MAC)

  • Carrier-sense multiple access
    • Basic concept and operation
    • Avoiding network instability
    • CSMA and denial-of-service (DoS) attacks
  • Distributed Coordination Function (DCF)
    • Channel access and back off
    • Performance
    • DCF and man-in-the-middle (MITM) attacks
  • Point Coordination Function (PCF)
    • Channel access and scheduling
    • Performance
  • Quality-of-Service
    • The QoS challenge
    • Overview of 802.11e QoS enhancements
  • Throughput capabilities
    • Frame transmission times
    • Throughput analysis
  • Management operations
    • Connection process
    • Addressing traffic flow

Part 4: IEEE 802.11i Access Control and Key Management

  • Introduction to Robust Security Network (RSN)
    • RSN security layers
    • Methods of authentication
    • 802.11i operational phases
  • 802.1X Port-Based Network Access Control
    • 802.1X authentication and key distribution
    • Digital certificate
    • Challenge-response using a RADIUS server
  • Extensible Authentication Protocol (EAP)
    • EAP request/response
    • EAP over LAN (EAPOL)
    • Key derivation and exchange
  • Transport Layer Security (TLS)
    • TLS handshake exchange
    • TLS and 802.11i
    • TLS over EAP
  • Security while roaming
    • Pre-authentication

Part 5: IEEE 802.11i Encryption

  • Wired Equivalent Privacy (WEP) weaknesses
    • Desired security criteria
    • WEP operation
    • Weaknesses: Authentication, data confidentiality, data integrity
  • Temporal Key Integrity Protocol (TKIP)
    • TKIP implementation
    • Encapsulation and decapsulation processes
    • TKIP message integrity
    • TKIP attack countermeasures
  • Advanced Encryption Standard (AES)
    • Requirements for WEP replacement
    • AES operation
    • AES modes and algorithms
    • 802.11i counter/cipher block chaining with message authentication code (CCM) protocol

Part 6: Wi-Fi Protected Access (WPA)

  • IEEE 802.11i and Wi-Fi Protected Access (WPA)
    • Comparison of 802.11i and WPA
  • Versions of WPA
    • WPA Personal vs WPA Enterprise
    • WPA vs WPA2
  • WPA and RSN key hierarchy
    • Pairwise and group keys
    • Key hierarchy
    • Key derivation
  • WPA implementation requirements
    • Access points
    • Network adaptors
    • Client software
  • WPA certification

Part 7: Wi-Fi Network Attack and Defense Methods

  • Specific attack methods
    • Planning and executing an attack
    • Summary of specific attack methods
  • General methods for enhancing Wi-Fi security
    • AP Placement
    • AP setup
    • Security outside of WPA/802.11i
  • Network analysis tools
    • Spectrum analyzer
    • Protocol analyzer
    • Other analyzers
  • Wireless Intrusion Detection Systems (WIDS)
    • Intrusion detection
    • Intrusion prevention
    • Implementation
    • Survey of available WIDS products


    • Course Recap and Q/A
    • Evaluations

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

    Time frame: