Wireless LAN Security Training

Wireless LAN Security Training

Print Friendly, PDF & Email


Wireless LAN Security Training Course by example

This Wireless LAN Security Training course targets experienced networking professionals who wish to gain critical skills in wireless networking security, including how hackers attack networks and the means for preventing them from doing so.

With the burgeoning growth of wireless LAN installations, all IT professionals must become knowledgeable about security – wireless security in particular System, network and security administrators. Individuals or organizations interested in new prevention, detection, or incident response technologies. University, government, or military

The purpose of the Wireless LAN Security Training course is to give you a full understanding of what wireless (802.11) networks are, how they work, how people find them and exploit them, and how they can be secured. This course is based on real world examples, solutions, and deployments. All material is developed and taught by individuals with extensive experience in wireless security research.

Duration: 3-4 days

Wireless LAN Security Training
Wireless LAN Security TrainingRelated Courses

Customize It:

• If you are familiar with some aspects of Wireless LAN Security Training, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the Wireless LAN Security Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Wireless LAN Security Training course in manner understandable to lay audiences.


After completing this Wireless LAN Security Training course, attendees will be able to:

• Understanding 802.11 Security Threats
• Security Management, Wireless LAN Intrusion and Policy
• Overview of security software and protocols for wireless LANs
• Exploring of the security weaknesses of and threats to wireless LANs
• Overview of implementation of the best and latest security techniques and mechanisms
• Implementation of WEP, WPA, WPA2, 802.11i and 802.1x

Wireless LAN Security Training – Course Outline:

Wireless LANs Security Basics

•Why Is 802.11 Vulnerable to Attack?
•Risk Assessment
•Intermediate Security Measures
•Radio Transmission
•Inherent Insecurity
•11, 802.11a, 802.11b and 802.11g
•Ad Hoc vs. Infrastructure Mode
•Wired Equivalent Privacy (WEP)
•64-bit and 128-bit WEP encryption
•WEP and RC4 stream cipher
•Initialization vector (IV)
•EAP Authentication Types
•LEAP Authentication
•Other Authentication Methods
•Transportation Layer Security
•A Comparison of Security Methods
•Wi-Fi Protected Access (WPA)

Wireless LANs Attacks and Risks

•An Example Network
•Denial-of-Service Attacks
•Wireless Risks
•Threat Analysis & Hacking
•Classification of Attacks
•Attacks Without Keys
•Man-in-the-Middle Attack (Modification)
•Attacks on the Keys
•One-time Passwords
•Burying the Keys
•Wireless Attacks
•Attacking the Keys Through Brute Force
•Dictionary Attacks (Dictionary-Building or Table Attacks)
•Algorithmic Attacks
•Target profiling
•Physical security
•Social engineering
•Wireless bridges
•Sniffing and stealing
•Malicious data insertion
•Denial of Service (DoS)
•Peer-to-peer hacking
•Unauthorized control

Maximizing Wireless Security

•Common Sense Solutions
•Components of WPA
•WPA Algorithms
•WPA Pre-Shared Key
•WPA2 (Wi-Fi Protected Access 2) Security
•WPA and WPA2
•IEEE 802.11i (RSN) – Enhanced Wireless Security
•11i vs. WPA2
•1x Authentication and 802.11i
•VPN over 802.11

Rudimentary security measures

•MAC filters
•Static WEP
•Default configurations
•Firmware upgrades
•Physical security
•Periodic inventory

Station Security

•Client Security Goals
•Audit Logging
•Security Updates
•FreeBSD Station Security
•Linux Station Security
•OpenBSD Station Security
•Mac OS X Station Security
•Windows Station Security
•Access Point Security
•Setting Up an Access Point
•General Access Point Security
•Up a Linux Access Point
•Setting Up a FreeBSD Access Point
•Setting Up an OpenBSD Access Point

Gateway Security

•Gateway Architecture
•Secure Installation
•Firewall Rule Creation
•Rate Limiting
•Static ARP
•Authentication and Encryption
•IPsec VPN
•IEEE 802.1X – Port Based Network Access Control

Intermediate Security Measures

•Rogue equipment
•Cell sizing
•Protocol filters
•Discovery protocols
•Wireless segment configuration
•Remove vulnerabilities
•Client security
•IP Services

Advanced Security Measures

•Wireless security policy
•Authentication & encryption
•Wireless DMZ and VLANs
•Authenticated DHCP
•Traffic patterns
•Wireless LAN Auditing Tools
•Discovery tools
•Password crackers
•Share enumerators
•Network management and control
•Wireless protocol analyzers
•Manufacturer defaults
•Password sniffers
•Antennas and WLAN equipment
•OS fingerprinting and port scanning
•Application sniffers
•Networking utilities
•Network discovery and management
•Hijacking users
•Jamming tools
•WEP crackers
•Operating system defaults

Hardware & Software Solutions

•RADIUS with AAA Support
•RADIUS Details
•Static and Dynamic WEP and
•1X Key Management
•Extensible Authentication Protocol (EAP)
•Encryption Schemes
•Mobile IP VPN Solutions
•Enterprise Wireless Gateways
•Switches, VLANs, & Hubs
•SSH2 Tunneling & Port

Prevention & Countermeasures

•CCM block diagram
•Intrusion detection
•WEP attacks
•WEP key recovery
•Weaknesses in the Key Scheduling Algorithm for RC4
•WPA and WPA attacks
•11i attacks
•1x attacks

Implementation and Management

•Design and implementation
•Equipment configuration and placement
•Interoperability and layering
•Security management

Wireless LAN Auditing Tools

•Discovery tools
•Password crackers
•Share enumerators
•Wireless protocol analyzers
•Manufacturer defaults
•Password sniffers
•Antennas and WLAN equipment
•OS fingerprinting and port scanning
•Application sniffers
•Networking utilities
•Network discovery and management
•Hijacking users
•RF Jamming and Dataflooding tools
•WEP crackers

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

    Time frame: