RKG Logo training-ITBiz
RKG Logo
Home Courses Fees Schedule REGISTER NOW Corporate Training Locations
ITBiz
columtop
Microsoft Office Tools
Adobe Acrobat Courses
SharePoint Training
Microsoft Dynamics
Social Media Courses
Project Management
Application Devp Tools
Oracle Developer Tools
Data Warehouse & BI
Data Base & System Admin
Programming Languages
Reporting Tools
Networking & Security
Web Technologies
BootCamps
Medical Records
Business Skills
ERP Training
Corporate Training On-Site
columnbottom
ITBiz
columnbottom
Securing Wireless Networks
Securing Wireless Networks
Securing Wireless Networks
 
Software Version Windows XP Professionals Wireless LAN v 1.0 or higher
Course Duration 4 Days
Course Type Class Room and Instructor-Led On-Line (E-Learning) Hands-On Training
Course Overview As organizations provide greater mobility to their users, the risk of threats to security grows and the need for secure wireless networks becomes of paramount concern. In this course, you gain the skills to defend against attacks and maintain security within your wireless network. You learn to detect weakness in your existing network and design and configure a cost-effective security solution. You gain extensive hands-on experience securing a wireless network. Exercises include:
  • Discovering and sniffing WLANs
  • Decoding and analyzing 802.11 frames
  • Cracking WEP and WPA2 PSK keys
  • Configuring WPA2 on APs and clients
  • Setting up 802.1X authentication
  • Installing and presenting digital certificates to RADIUS server
  • Comparing and contrasting EAP-TLS and PEAP
  • Roaming in a secure environment
  • Configuring a wireless IDS
Intended Audience for this course The target student for this course is any person who has basic end-user skills on Windows-based computers and who wishes to use network and Internet services (such as file sharing, printing, email and other communications, and searching for information), begin training for a career in the information technology field, or prepare for certification.
Course Topics
Wireless Security Technologies
    Security requirements
  • Availability
  • Confidentiality
  • Data integrity
  • Authenticity
WLAN operation and standards
  • 802.11 (Wi-Fi) standards
  • Frequency allocation and modulation techniques
Wi-Fi access points and stations
  • Sniffing 802.11 Association and Authentication
  • Infrastructure models and roaming
Surveying other wireless technologies
  • Bluetooth WPANs (802.15)
  • WiMAX WWANs (802.16)
Analyzing WPA2 and 802.11i Cryptography
  • Encrypting Wi-Fi traffic for privacy
  • Symmetric vs. asymmetric algorithms
  • Block Ciphers vs. Streaming Ciphers
  • The role of key hierarchies in encryption
Guaranteeing message integrity
  • Hashing with MD5 and SHA
  • Protecting data with digital signatures
Authenticating users with digital certificates
  • Verifying key ownership
  • Chains of authority
Encrypting Wi-Fi Traffic with TKIP or AES
    Overcoming problems with legacy WEP
  • Key reuse
  • Shared Keys
Deploying TKIP as an alternative to WEP
  • Upgrading legacy hardware
  • Rolling TKIP keys per frame
  • Integrity checking with Michael
  • Migrating to AES encryption
  • Using Counter and Cipher Block Chaining modes with AES
  • AES performance issues
Authenticating Wi-Fi Users with PSK or EAP
    Deploying pre-shared key (PSK) authentication
  • Generating master keys from a passphrase
  • Addressing scalability issues
  • Leveraging the 802.1X standard
  • Incorporating EAP messaging techniques
  • Transporting EAP messages with RADIUS and EAPOL
Choosing EAP implementations
  • EAP-TLS
  • EAP-TTLS
  • PEAP
Authenticating against enterprise directories
  • LDAP
  • Active Directory
  • NT Domains
Creating Secure WLAN Topologies
    Designing the wireless security landscape
  • Defining the trusted boundary
  • Centralized vs. distributed control
  • Enforcing access controls
  • Establishing user credentials
  • Configuring security for roaming
  • Maintaining security contexts
  • 802.11i pre-authentication
  • Roaming in a VPN environment
Evaluating network types
  • Public hot spots
  • Visitor and guest networks
  • Integrated corporate WLAN
  • Maintaining auditing and accounting systems
  • RADIUS accounting
  • Access Point logging
Detecting and Responding to Wi-Fi Attacks
    Denial of Service (DoS) attacks
  • Jamming and RF interference
  • Exploiting the Collision Avoidance (CA) mechanism
  • Forcing 802.11 de-authentication
Authentication and privacy attacks
  • WEP key cracking
  • Brute force attacks against WPA PSK

Enroll Online   

Live Chat
Enroll Online
Enroll By Fax
Fee & Schedule
Send Message
Testimonials
ITBiz
columtop
columnbottom
ITBiz
Follow us on .....
ITBiz
For further information call 949-387-3772 or FAX 949-681-8247 or email to info@SONUtraining.com
SONU Training is the training wing of RKG Technologies Inc
Disclaimer: RKG Technologies is not linked with Microsoft, Oracle, Adobe, IBM or any other software company we provide training
Copyright © 2004 RKG Technologies Inc. All rights reserved.