WiFi Wireless LAN Security Training

WiFi Wireless LAN Security Training

Course Delivery

This Course is available in the following format:

Request this course in a different delivery format

GSA Schedule 70 Saving for Government Customers

Course Overview:

WiFi Wireless LAN Security Training Course Hands-on

In this three-day WiFi Wireless LAN Security Training course, you will undertake an in-depth study of the IEEE 802.11 (WiFi) wireless local area network security issues. Aspects of disclosure, data integrity, and denial-of-service threats are reviewed. Principles of indoor RF propagation are used to calculate the extent of eavesdropping and jamming threats to the physical layer. The 802.11 Medium Access Control (MAC) methods are looked at and the numerous threats to this layer are discussed. Next, Wired Equivalent Privacy (WEP) is presented and its weaknesses examined in areas of disclosure, data integrity, and authentication. The IEEE 802.11i-based solutions are discussed, beginning with interim solutions such as Temporal Key Integrity Protocol (TKIP), and moving on to stronger solutions based on the Advanced Encryption Standard (AES). The synergies between Wi-Fi protected access (WPA) and 802.11i are explored. Finally, upper layer authentication and key management as provided by IEEE 802.1X are discussed.

Customize It:

• If you are familiar with some aspects of this WiFi Wireless LAN Security Training course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the WiFi Wireless LAN Security Training course in manner understandable to lay audiences.

Related Courses:

WiFi Technology Principles and Operation Training
WiFi LAN Operation and Security Training

What You Will Learn:

Upon completing this WiFi Wireless LAN Security Training course, learners will be able to meet these objectives:

• Describe general security threats on disclosure, data integrity, and denial-of-service
• Calculate the extent of security vulnerabilities at the physical layer
• Describe various security threats at the IEEE 802.11 Medium Access Control (MAC) layer
• Demonstrate an in-depth understanding of Wired Equivalent Privacy (WEP) operation and weaknesses
• Comprehend IEEE 802.11i robust security network (RSN) operations
• Describe the operation of temporal Key Integrity Protocol (TKIP) and the Advanced Encryption Standard (AES)
• Demonstrate 802.1X authentication and key management operation
• Show how the various WEP vulnerabilities are addressed by RSN

WiFi Wireless LAN Security Training – Course Syllabus:

Day One

◾IntroductionSecurity overview
◾Short-range wireless systems
◾WLAN characteristics
◾Categories of information transmission
◾Security threats
◾IEEE 802.11 operations overview
◾Propagation and Range LimitReview of decibels
◾Link budget equation and path loss model
◾Calculating maximum range
◾Partition attenuation and primary ray tracing
◾Eavesdropping and jamming vulnerabilities
◾Multipath characteristics and mitigation
◾802.11 Physical LinkRF modulation methods used in 802.11a/b/g
◾Direct sequence spread spectrum
◾Operating frequencies and signal spectrum
◾802.11b radio requirements
◾Modeling interference and jamming

Day Two

◾802.11 Physical Link (continued)802.11b PHY packet structure
◾Orthogonal Frequency Division Multiplexing (OFDM)
◾802.11a/g radio requirements
◾802.11a/g jamming vulnerability
◾802.11a/g PHY packet structure
◾Multiple-Input Multiple-Output (MIMO) methods
◾802.11 Medium Access Control (MAC)Carrier-sense multiple-access operation and throughput
◾Distributed coordination function (DCF) operation
◾Point coordination function (PCF) operation
◾MAC frame construction and examples
◾IEEE 802.11e quality-of-service (QoS) operation
◾802.11 management operations

Day Three

◾Wired Equivalent Privacy (WEP)Shared key and public key cryptography
◾Cryptanalysis attack methods
◾WEP encryption process and weaknesses
◾WEP data integrity process and weaknesses
◾WEP access control process and weaknesses
◾Denial-of-service attack methods
◾Bluetooth security overview and comparison to WEP
◾Security EnhancementsIEEE 802.11i robust security network (RSN) overview
◾Temporal Key Integrity Protocol (TKIP) operation and vulnerability
◾Advanced Encryption Standard (AES) operation and implementation
◾AES counter mode with cipher block chaining protocol (CCMP) operation
◾802.1X extensible authentication protocol (EAP) and variants
◾802.1X key distribution methods
◾RSN information elements
◾Wi-Fi Protected Access (WPA) operation
◾Security analysis and cracking tools
◾Virtual Private Network (VPN) operation

Wrap-Up: Course Recap, Q/A, and Evaluations

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

Print Friendly, PDF & Email