WiFi LAN Operation and Security Training

classroom Live training locations in Canada onsite training virtual training live
Classroom Live Online Live Onsite Training Self-Paced

WiFi LAN Operation and Security Training

Introduction:

WiFi LAN Operation and Security Training Course Hands-on

This WiFi LAN Operation and Security Training course is aimed at those interested in learning WiFi architecture and operation with particular interest in the security issues, such as those involved in performing security audits of WiFi networks. However, with content adjustment as needed, the course will benefit other audiences as well.

Customize It:

● If you are familiar with some aspects of this course, we can omit or shorten their discussion.
● We can adjust the emphasis placed on the various topics or build the course around the mix of technologies of interest to you (including technologies other than those included in this outline).
● If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the course in manner understandable to lay audiences.

Related Courses:

name
name

Duration: 4 days

Course Content:

Part 1: Introduction to IEEE 802.11 and Wi-Fi

Wired vs wireless communicationsComparison of security challenges
Introduction to security attacks and countermeasuresLayered security attack methods
Shared key and public key cryptography
Overview of IEEE 802.11 and Wi-FiGeneral architecture
Wi-Fi Alliance
IEEE 802.11 task groups

Part 2: Wi-Fi Physical (PHY) Layer

Range calculations and PHY vulnerabilitiesCalculating maximum range
Eavesdropping range of vulnerability
Jamming range of susceptibility
Countermeasures
Basic modulation methodsModulated signal structure
Amplitude, frequency, and phase shift keying
Direct sequence spread spectrum (802.11b)DSSS methods
Processing gain
Complementary code keying (CCK)
Advanced modulation methods (802.11g/n)Quadrature Amplitude Modulation (QAM)
Orthogonal Frequency Division Multiplexing (OFDM)
Performance
Advanced antennas and multiple-input multiple-output (MIMO)802.11n MIMO
802.11n operating modes and performance
Error ControlError detection and correction
Automatic repeat request

Part 3: Wi-Fi Medium Access Control (MAC)

Carrier-sense multiple accessBasic concept and operation
Avoiding network instability
CSMA and denial-of-service (DoS) attacks
Distributed Coordination Function (DCF)Channel access and backoff
Performance
DCF and man-in-the-middle (MITM) attacks
Point Coordination Function (PCF)Channel access and scheduling
Performance
Quality-of-ServiceThe QoS challenge
Overview of 802.11e QoS enhancements
Throughput capabilitiesFrame transmission times
Throughput analysis
Management operationsConnection process
Addressing and traffic flow

Part 4: IEEE 802.11i Access Control and Key Management

Introduction to Robust Security Network (RSN)RSN security layers
Methods of authentication
802.11i operational phases
802.1X Port-Based Network Access Control802.1X authentication and key distribution
Digital certificate
Challenge-response using a RADIUS server
Extensible Authentication Protocol (EAP)EAP request/response
EAP over LAN (EAPOL)
Key derivation and exchange
Transport Layer Security (TLS)TLS handshake exchange
TLS and 802.11i
TLS over EAP
Security while roamingPreauthentication

Part 5: IEEE 802.11i Encryption

Wired Equivalent Privacy (WEP) weaknessesDesired security criteria
WEP operation
Weaknesses: Authentication, data confidentiality, data integrity
Temporal Key Integrity Protocol (TKIP)TKIP implementation
Encapsulation and decapsulation processes
TKIP message integrity
TKIP attack countermeasures
Advanced Encryption Standard (AES)Requirements for WEP replacement
AES operation
AES modes and algorithms
802.11i counter/cipher block chaining with message authentication code (CCM) protocol

Part 6: Wi-Fi Protected Access (WPA)

IEEE 802.11i and Wi-Fi Protected Access (WPA)Comparison of 802.11i and WPA
Versions of WPAWPA Personal vs WPA Enterprise
WPA vs WPA2
WPA and RSN key hierarchyPairwise and group keys
Key hierarchy
Key derivation
WPA implementation requirementsAccess points
Network adaptors
Client software
WPA certification

Part 7: Wi-Fi Network Attack and Defense Methods

Specific attack methodsPlanning and executing an attack
Summary of specific attack methods
General methods for enhancing Wi-Fi securityAP placement
AP setup
Security outside of WPA/802.11i
Network analysis toolsSpectrum analyzer
Protocol analyzer
Other analyzers
Wireless Intrusion Detection Systems (WIDS)Intrusion detection
Intrusion prevention
Implementation
Survey of available WIDS products

Course Recap and Q/A

Evaluations

Whether you are looking for general information or have a specific question, we want to help

Request More Information

Time Frame: 0-3 Months4-12 Months

Location

If multiple locations, please list in the additional comments field.

On-site
Virtual


Public Training Schedule
Private Group Training

Print Friendly, PDF & Email