Wireless Security Training

Wireless Security Training

Print Friendly, PDF & Email


Wireless Security Training Course Hands-on

Wireless Security Training includes Wireless Ethical Hacking, Penetration Testing, and Defenses covering all aspect of wireless technologies. A comprehensive course covering wireless technologies, security, vulnerabilities, threats, exploits, and the defense techniques and technologies.

Understand the attackers and the the enemies including thrill seekers and wardrivers, bandwidth thieves, and knowledgeable attackers. Learn about elements of security including the techniques used for authentication, ciphering, encryption, and identity protection.

As the wireless and mobile networks shift to all IP-based networks, the infrastructures become increasingly exposed to advanced threats designed to steal information or impact service availability and quality. To become a wireless and mobile security expert, you need to have a comprehensive understanding of the wireless and mobile technologies, knowledge on threats and exploits, and the defense techniques.

Wireless Security Training course provides hands-on exercises in evaluating and attacking wireless and mobile networks including WiFi, Bluetooth, Zigbee, RFID, GSM, CDMA, UMTS, LTE, Microwave, SATCOM and VSAT. We will expose you to the wireless and mobile security threats from the perspective of attackers and hackers.

Duration: 3 days

Wireless Security Training
Wireless Security TrainingRelated Courses

Customize It:

• If you are familiar with some aspects of Wireless Security Training, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the Wireless Security Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Wireless Security Training course in manner understandable to lay audiences.


After completing this Wireless Security Training course, attendees will be able to:

Wireless Security Training – Course Outline:

◾ Wireless Network Architecture
◾ Overview of Security Technologies
◾ Wireless Security Fundamentals
◾ Wireless Security Techniques
◾ Wireless Security Exposed
◾ Wireless Security Strategies and Implementation
◾ Wireless Data Collection
◾ WiFi MAC Protocol Analysis
◾ Wireless Tools
◾ Wireless Information Analysis
◾ Concepts behind Crypto
◾ Encryption, Authentication, Integrity, and Access Control
◾ Concepts behind Enterprise Attacks
◾ Advanced WiFi Attack Techniques
◾ Unauthorized access
◾ Ad-hoc network security
◾ Identity theft (MAC spoofing)
◾ Man-in-the-middle attacks
◾ Denial of service
◾ Network injection
◾ Caffe Latte attack
◾ Security measures
◾ Bluetooth, DECT and ZigBee Security and Attacks
◾ Cellular and Mobile Network Security and Attacks: GSM, CDMA, UMTS/HSPA+, LTE
◾ Microwave, Satellite Communications and VSAT Security and Attacks
◾ Wireless Security Strategies and Implementation
◾ Wireless Risk Mitigation

Whether you are looking for general information or have a specific question, we want to help!
Request More Information

    Time frame: