Wireless LAN Security

5 Day Course
Hands On
Official Curriculum
Code PDN

Book Now - 1 Delivery Method Available:

Classroom Virtual Classroom Private Group - Virtual Self-Paced Online

Overview

Wireless LAN Security is preparation course for the CWSP™ certification (Certified Wireless Security Professional). The course teaches students the necessary skills for implementing and managing wireless security in the enterprise by creating layer2 and layer3 hardware and software solutions using tools from industry leading manufacturers. Audience: This course targets experienced networking professionals who wish to gain critical skills in wireless networking security, including how hackers attack networks and the means to prevent such attacks. With the burgeoning growth of wireless LAN installations, all IT professionals must become knowledgeable about security and wireless security in particular.

Wireless LAN Security is preparation course for the CWSP certification (Certified Wireless Security Professional). The course teaches students the necessary skills for implementing and managing wireless security in the enterprise by creating layer2 and layer3 hardware and software solutions using tools from industry leading manufacturers.

Training Partners

We work with the following best of breed training partners using our bulk buying power to bring you a wider range of dates, locations and prices.

Modules

Collapse all

Risk Assessment (7 topics)

  • Assets to protect
  • Threats to protect against
  • Legal protection
  • Costs
  • Basic security measures
  • Threat analysis
  • Impact analysis

Threat Analysis and Hacking Methodology (10 topics)

  • Target profiling
  • Physical security
  • Social engineering
  • Wireless bridges
  • Packet analysis
  • Information theft
  • Malicious data insertion
  • Denial of Service (DoS)
  • Peer-to-peer hacking
  • Unauthorized control

Rudimentary Security Measures (7 topics)

  • SSID
  • MAC filters
  • Static WEP
  • Default configurations
  • Firmware upgrades
  • Physical security
  • Periodic inventory

Intermediate Security Measures (9 topics)

  • Rogue equipment
  • Cell sizing
  • Protocol filters
  • SNMP
  • Discovery protocols
  • Wireless segment configuration
  • Removing vulnerabilities
  • Client security
  • IP Services

Advanced Security Measures (6 topics)

  • Wireless security policy
  • Authentication and encryption
  • Wireless DMZ and VLANs
  • Audits
  • Traffic pattern analysis
  • Authenticated DHCP

Wireless LAN Auditing Tools (18 topics)

  • Discovery tools
  • Password crackers
  • Share enumerators
  • Network management
  • and control
  • Wireless protocol analyzers
  • Manufacturer defaults
  • Password sniffers
  • Antennas and WLAN equipment
  • OS fingerprinting and
  • port scanning
  • Application sniffers
  • Networking utilities
  • Network discovery and management
  • Hijacking users
  • RF Jamming and
  • Dataflooding tools
  • WEP crackers

Hardware and Software Solutions (16 topics)

  • RADIUS with AAA Support
  • RADIUS Details
  • Kerberos
  • Static and Dynamic WEP and TKIP
  • 802.1x
  • Extensible Authentication Protocol (EAP)
  • VPNs
  • Encryption Schemes
  • Routers
  • Switch-Routers
  • Firewalls
  • MobileIP VPN Solutions
  • Enterprise Wireless Gateways
  • Switches, VLANs, & Hubs
  • SSH2 Tunneling & Port Redirection
  • Thin Client Solutions

Prevention and Countermeasures (5 topics)

  • 802.1x
  • 802.11i
  • TKIP
  • AES
  • Intrusion detection

Implementation and Management (4 topics)

  • Design and implementation
  • Equipment configuration and placement
  • Interoperability and layering
  • Security management

Hands On Lab Exercises - throughout course (12 topics)

  • Packet Analysis and Spoofing
  • Rogue Hardware and Default Settings
  • RF Jamming and Data Flooding
  • Information Theft
  • Wireless Hijacking and DoS Attacks
  • Access Point VPNs
  • Scalable Wireless VPN Solutions
  • EAP - Cisco® Wireless (LEAP)
  • Layered Wireless Security
  • Wireless Bridging Security
  • 802.1x and EAP-TTLS
  • SSH2 Tunneling and Local Port Redirection

Prerequisites

The CWNA certification is recommended prior to attending the CWSP class. CWNA certification is required before taking the CWSP exam. It is recommended that all students earn either the Security Certified Network Professional (SCNP) or CompTIA Security+ certification or have at least 12 months experience in a network security related field prior to enrolling in this course.

What Our Customers Say

The training was delivered with a high level of expertise and excellence. Instructor was highly knowledgeable.”

Technical Trainer, Aviat Networks

Overall the course was really good, the trainer really understood the material and was very approachable.”

Customer Training Manager, Aviat Networks

Excellent course, informative and well-paced.”

CSE, Cisco

Course was very well outlined. Topics were great and bridged many gaps.”

System Engineer, Cable & Wireless

An excellent intro to video encoding & MPEG transport streams - I would definitely recommend it.”

Broadcast Engineer, Cisco

Definitely an excellent intro. Left me interested in learning more.”

Broadcast Engineer, Eircom

Excellent training course with real examples and practical classroom demonstrations.”

Transport Designer, Orange

Instructor knowledge and experience was excellent.”

Solutions Engineer, Akamai

Excellent course, very clear and well organised. Course content delivery was very good.”

Assistant Engineer, Dhiraagu

Very informative and appropriate.”

Network Support Technician, BT

Course PDF

Print

Share this Course

Share

Recommend this Course

Sections