• Classroom
Course Description

Mobility is a business enabler and the days of forcing all corporate traffic through locked-down wired connections are long gone. However, wireless networks are more vulnerable and trickier to secure than a hard-lined connection because of rogue access points, insecure connections, and mobile devices that, themselves, haven't been secured properly and are transmitting data in the clear. Furthermore, with today's affordable technology, it's not much of a challenge for adversaries to scan for and find open access points, some of which haven't been implemented by the security team, or even with security in mind at all.

This course will introduce students to the essential theories and practices necessary to understand how to secure wireless local access networks (WLANs), commonly referred to as WiFi. The course will cover network architecture, common threats, and how to defend against them. Students will learn basics of various WLAN deployments to include network design, protocol choice, and security topics. Emphasis will be on collecting, analyzing, and assessing network configuration in accordance with industry best practices in search of potential risk.

This course is only available on-site at your location.

Learning Objectives

  • Day 1
    1. Wireless fundamentals, Wireless Protocols; 802.11, a, b, g, n, et al., Security Protocols; WEP; WPA; WPA2, Network layouts; Where to deploy; Signal strength; Signal interference; Beaconing intervals; Signal channels (1-11), Authentication Protocols; Open networks; Personal; Enterprise; EAP, PEAP, LEAP, or RADIUS, Summary
  • Day 2
    1. Security Controls, Segmentation, DHCP settings, RF Shaping, SSID Hiding, MAC Filtering, IP Filtering, Encryption, Strong authentication, Certificate Authority, WIDS/WIPS, Logging
  • Day 3
    1. Passive Attacks, War driving, Extended range, Traffic analysis, Detecting hidden SSID
    2. Active Attacks, Denial of service, Spoofing, Injection attacks, Routing attacks, Pineapple Routers, Defeating MAC Filtering| Day 4
    3. Cracking Encryption, WEP, WPA, WPA2, IPSEC over WPA
    4. Auditing Wireless, Tools necessary, Site analysis, Mapping
    5. RF other than WiFi, WiGIG, WiMAX, Bluetooth, Microwave, RFID, NFC

Framework Connections