This wireless security training course (2 days) – completely revised this year – gives delegates an understanding of:
- The evolution of wireless security
- How hackers bypass wireless security
- Implementing wireless security measures
- The cryptographic principles behind the protocols and the attacks
The course follows the evolution of wireless security, teaching the underlying principles so that delegates leave not only with an understanding of the current scene but also better prepared as the world of wireless inevitably changes. Hands-on exercises reinforce theory with practice, allowing delegates to see the methods work for themselves.
- 802.11 Wi-Fi fundamentals
- Wardriving – access points and stations
- Traffic sniffing
- Denial of service
- Rogue Access Points – inside and out
- Rogue stations
- Circumventing MAC filtering
- Symmetric key cryptography – stream and block ciphers, RC4 and AES
- 802.11i and WPA/WPA2
- TKIP and CCMP
- Wi-Fi Protected Setup (WPS) flaws
- Client-side (i.e. non Access Point) threats and attacks
- EAP, 802.1X and RADIUS
- Public key cryptography
- A basic understanding of TCP/IP networking, e.g.
- Are you familiar with the OSI model? Can you name a layer 2 and layer 3 protocol?
- Can you describe at a high-level how a request reaches a web server through Ethernet, IP and TCP?
- What function does ARP perform?
- How does a system know whether or not a gateway is required?
- What is a TCP port?
- Familiarity with Windows or Linux command line. As a guideline, you should be able to tick off the following (without heavy recourse to Google):
- Understand how switches change the way commands work
- How does adding > affect a command?
- Understand the difference between cd /folder/file and cd folder/file (i.e. what does / at the front of the path do?)
- Understand the difference between ../file and ./file
- Understand how to pull up built-in help for a command
Read the wireless security training course outline to find out more about the many topics covered in CWSA Wireless Security: Hands-On
Frequently Asked Questions (FAQ)