Wireless LAN Security Training:
Wireless LAN Security Training Course (Online, Onsite, and Classroom Live!)
This Wireless LAN Security Training course targets experienced networking professionals who wish to gain critical skills in wireless networking security, including how hackers attack networks and the means for preventing them from doing so.
With the burgeoning growth of wireless LAN installations, all IT professionals must become knowledgeable about security – wireless security in particular System, network, and security administrators. Individuals or organizations are interested in new prevention, detection, or incident response technologies. University, government, or military
The purpose of the Wireless LAN Security Training course is to give you a full understanding of what wireless (802.11) networks are, how they work, how people find them and exploit them, and how they can be secured. This course is based on real-world examples, solutions, and deployments. All material is developed and taught by individuals with extensive experience in wireless security research.
What’s Included?
- 3 days of Wireless LAN Security Training with an expert instructor
- Wireless LAN Security Training Electronic Course Guide
- Certificate of Completion
- 100% Satisfaction Guarantee
Resources:
- Wireless LAN Security Training – https://www.wiley.com/
- Wireless LAN Security Training – https://www.packtpub.com/
- Wireless LAN Security Training – https://store.logicaloperations.com/
- Wireless LAN Security Training – https://us.artechhouse.com/
- Wireless LAN Security Training – https://www.amazon.com/
Related Courses
- BLE Training | Bluetooth Low Energy Training
- WiFi Training For Non-Engineers
- Wireless for Law Enforcement and Homeland Security Training
- WiFi Training Fundamentals
- WiFi LAN Operation and Security Training
- WiFi Technology Principles and Operation Training
- WiFi Technology, Applications, Design, and Deployment Training
- Metropolitan WiFi Network Design and Deployment Training
- SCADA Security Training
Customize It:
- If you are familiar with some aspects of Wireless LAN Security Training, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Wireless LAN Security Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Wireless LAN Security Training course in a manner understandable to lay audiences.
Audience/Target Group
- This course targets experienced networking professionals who wish to gain critical skills in wireless networking security, including how hackers attack networks and the means for preventing them from doing so. With the burgeoning growth of wireless LAN installations, all IT professionals must become knowledgeable about security – wireless security in a particular system, networks, and security administrators. Individuals or organizations who are interested in new prevention, detection, or incident response technologies. University, government, or military
Objectives:
After completing this Wireless LAN Security Training course, attendees will be able to:
- Understanding 802.11 Security Threats
- Security Management, Wireless LAN Intrusion, and Policy
- Overview of security software and protocols for wireless LANs
- Exploring the security weaknesses of and threats to wireless LANs
- Overview of implementation of the best and latest security techniques and mechanisms
- Implementation of WEP, WPA, WPA2, 802.11i, and 802.1x
Course Syllabus:
Wireless LANs Security Basics
- Why Is 802.11 Vulnerable to Attack?
- Risk Assessment
- Intermediate Security Measures
- Radio Transmission
- Inherent Insecurity
- 802.11, 802.11a, 802.11b, 802.11g and 802.11n
- Ad Hoc vs. Infrastructure Mode
- Wired Equivalent Privacy (WEP)
- 64-bit and 128-bit WEP encryption
- WEP and RC4 stream cipher
- An initialization vector (IV)
- 802.1x
- EAP Authentication Types
- LEAP Authentication
- Other Authentication Methods
- Transportation Layer Security
- A Comparison of Security Methods
- Wi-Fi Protected Access (WPA)
- 802.11i
Wireless LANs Attacks and Risks
- An Example Network
- Denial-of-Service Attacks
- Wireless Risks
- Threat Analysis & Hacking
- Methodology
- Classification of Attacks
- Attacks Without Keys
- Snooping
- Man-in-the-Middle Attack (Modification)
- Attacks on the Keys
- One-time Passwords
- Burying the Keys
- Wireless Attacks
- Attacking the Keys Through Brute Force
- Dictionary Attacks (Dictionary-Building or Table Attacks)
- Algorithmic Attacks
- Target profiling
- Physical security
- Social engineering
- Wireless bridges
- Sniffing and stealing
- Malicious data insertion
- Denial of Service (DoS)
- Peer-to-peer hacking
- Unauthorized control
Maximizing Wireless Security
- Common Sense Solutions
- WEP
- WPA
- WPA2
- 802.11i
- 802.1x
- Components of WPA
- WPA Algorithms
- WPA Pre-Shared Key
- WPA RADIUS
- WPA2 (Wi-Fi Protected Access 2) Security
- WPA and WPA2
- IEEE 802.11i (RSN) – Enhanced Wireless Security
- TKIP
- AES
- 802.11i vs. WPA2
- 802.1x Authentication and 802.11i
- EAP-PEAP-LEAP
- EAP-TLS
- EAP-TTLS
- VPN over 802.11
Rudimentary security measures
- SSID
- MAC filters
- Static WEP
- Default configurations
- Firmware upgrades
- Physical security
- Periodic inventory
Station Security
- Client Security Goals
- Audit Logging
- Security Updates
- FreeBSD Station Security
- Linux Station Security
- OpenBSD Station Security
- Mac OS X Station Security
- Windows Station Security
- Access Point Security
- Setting Up an Access Point
- General Access Point Security
- Up a Linux Access Point
- Setting Up a FreeBSD Access Point
- Setting Up an OpenBSD Access Point
Gateway Security
- Gateway Architecture
- Secure Installation
- Firewall Rule Creation
- Rate Limiting
- DHCP
- DNS
- Static ARP
- Auditing
- Authentication and Encryption
- Portals
- IPsec VPN
- IEEE 802.1X Port-Based Network Access Control
Intermediate Security Measures
- Rogue equipment
- Cell sizing
- Protocol filters
- SNMP
- Discovery protocols
- Wireless segment configuration
- Remove vulnerabilities
- Client security
- IP Services
Advanced Security Measures
- Wireless security policy
- Authentication & encryption
- Wireless DMZ and VLANs
- Audits
- Authenticated DHCP
- Traffic patterns
- Wireless LAN Auditing Tools
- Discovery tools
- Password crackers
- Share enumerators
- Network management and control
- Wireless protocol analyzers
- Manufacturer defaults
- Password sniffers
- Antennas and WLAN equipment
- OS fingerprinting and port scanning
- Application sniffers
- Networking Utilities
- Network discovery and management
- Hijacking users
- Jamming tools
- WEP crackers
- Operating system defaults
Hardware & Software Solutions
- RADIUS with AAA Support
- RADIUS Details
- Kerberos
- Static and Dynamic WEP and
- TKIP
- 802.1x
- 802.1X Key Management
- PMK, GMK, PTK, GTK, KCK, and KEK
- Extensible Authentication Protocol (EAP)
- VPNs
- Encryption Schemes
- Routers
- Switch-Routers
- Firewalls
- MobileIP VPN Solutions
- Enterprise Wireless Gateways
- Switches, VLANs, & Hubs
- SSH2 Tunneling & Port
Prevention & Countermeasures
- 802.1x
- 802.11i
- TKIP
- AES
- CCM block diagram
- Intrusion detection
- WEP attacks
- WEP key recovery
- Weaknesses in the Key Scheduling Algorithm for RC4
- WPA and WPA attacks
- 801.11i attacks
- 802.1x attacks
Implementation and Management
- Design and Implementation
- Equipment configuration and placement
- Interoperability and layering
- Security management
- Policy
Wireless LAN Auditing Tools
- Discovery tools
- Password crackers
- Share enumerators
- Wireless protocol analyzers
- Manufacturer defaults
- Password sniffers
- Antennas and WLAN equipment
- OS fingerprinting and port scanning
- Application sniffers
- Networking utilities
- Network discovery and management
- Hijacking users
- RF Jamming and Dataflooding tools
- WEP crackers
Whether you are looking for general information or have a specific question, we want to help!
Request More Information