• Telecommunications Consulting

    Telecommunications Consulting

    Consulting Services from Network Design to Project Management Read More
  • Internetworking Training Experts

    Internetworking Training Experts

    Click on Training and then Courses. Read More
  • Wireshark Experts

    Wireshark Experts

    Packet analysis expertise is critical in today's networks, and being able to use the best packet analyzer application is a skill we can help you and your team attain. Read More
  • Are you a Network Scientist?

    Are you a Network Scientist?

    Online Learning, Instructor Led in person or Web-based delivery. Check out our online school. Read More
  • Online Certification Training

    Online Certification Training

    Find out about our Network Self Certification Program for Rural Service Providers here! Read More
  • IPv6 Experts

    IPv6 Experts

    Along with other Internet regions, ARIN is out of IPv4 Addresses. Are you IPv6 fluent? Are you IPv6 ready? Read More
  • Enabling the IoT with Wireless

    Enabling the IoT with Wireless

    Without wireless, we cannot have the Internet of Things. Read More
  • MPLS Book for iPad and iPhone

    MPLS Book for iPad and iPhone

    Get Mr. Walding's book here! Read More
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8

Welcome to CellStream, Inc. - Telecom Consulting and Training!

Welcome to our home on the Internet, where we can not only share information, but also interact with each other. If you are a visitor to the site, there are a number of things to view: our FAQ'sNetworking and Computing Tips, our CellStream Blog, and other fun reading can all be found in the drop down menus above.  The Training menu provides access to our courses, our course calendar, and learning services.  The Consulting Menu provides information on our consulting services and a place to meet our consulting and teaching team.  Registered CellStream folks and our clients will log in using their private credentials to access projects, calendars and discussions.

Thanks for visiting! We always welcome comments and suggestions.  You can also join our Slack channel here!

Rate this content:
0 of 5 - 0 votes
Thank you for rating this article.

CellStream Logo trim plus TM 150x50  

CellStream, Inc. - Telecom Consulting and Training!            

1-Day Instructor Led Hands On Lab Class
Available in Web Based delivery 
Minimum 10 students - Maximum 30 students


Course Description:

Ease of sensitive and personal data access in the increasingly mobile world mean that most people in the wireless or telecommunications industries must understand how security applies to their technologies. New government and industry regulations also make security awareness mandatory in many roles across these industries. wifi security small

The purpose of this course is to provide students with a detailed understanding of security in wireless networks.  The course takes the student through key security mechanisms for providing wireless network access, and protecting the confidentiality and integrity of wireless traffic. It then shows how these mechanisms have been applied in Wi-Fi networks.

Once the student has an understanding of how the various wireless security networks are secured, this course details the security mechanisms defined in the Wi-Fi standards.  The course explains 802.1x port based authentication and the student will gain a clear understanding of the technical difference between WPA2-Personal and WPA2-Enterprise. While most of the focus in on the 802.11i security amendment, the 802.11r 3-level key hierarchy and 802.11w, protection of management frames are also covered.

This is an instructor led technical course intended to give the student a thorough understanding of both the theoretical and practical aspects of wireless security.

Course Objectives:

At the end of the course, the student will be able to:

  • Explain the core principles of wireless security
  • List the security mechanisms used to protect wireless networks
  • Distinguish between the various wireless security technologies
  • Apply key security concepts including cryptography, authentication, authorization, privacy, confidentiality, integrity, and availability in a wireless security context

  • Identify well-known wireless networks attacks and the security techniques that protect against these attacks

  • IdentifyDescribe the key features of wireless security standards and their use in today’s wireless networks including 802.1X, EAP, digital certificate, CCMP, and AES

  • Detail how Wi-Fi security works, including both WPA2-Personal and WPA2-Enterprise

  • Recognize and describe acronyms and terminology that apply to wireless security (supplemental glossary provided by instructor)


The target audience for this course is anyone in Engineering, Test, Customer Support, Technical Marketing, or even Sales and Marketing that requires an understanding of the wireless security threats and countermeasures, and seeks to comprehend the challenges of wireless security that can be applied to their job function.

Ideal candidates are:

  • IT professionals working on wireless networks
  • Operations individuals that will provide wireless security configuration and support wireless services
  • Network Design Engineers that need to understand wireless security
  • Network Management individuals that are providing element and network management tools
  • Technical sales individuals that must be able to correlate wireless security issues and threats with functionality
  • Technical marketing individuals that want more than just a basic understanding of wireless security
  • Certification Track individuals that need to expand their knowledge and studies
  • Network Administrators
  • Security professionals that need a deep-dive understanding of wireless network security

Course Prerequisites:

This course is designed to appeal to anyone needing the skills and knowledge of the wireless security. It is highly recommended that the student first takes the wireless Wi-Fi-101 Foundation course that we offer.

Course Materials:

Students will be provided with a Course Student Guide via the Online School of Network Sciences as well as many course reference materials.

Related Content:

There are a number of related courses we offer that explore the technical aspects of both today’s and tomorrow’s wireless networks. 

Course Outline:

  • Wireless security threats

    • Network attacks from external sources

    • Attacks on the network from internal sources

    • Types of wireless attacks

    • Network security principles

  • Security terminology and concepts

    • The science of cryptography and cryptanalysis

    • Symmetric and asymmetric cryptograph and its application
    • Distinguishing between shared secret and public key cryptography

    • Digital certificates and their usages

    • Illustration of X.509 digital certificate

    • How hash and Message Authentication Codes (MAC) are used 

  • Wi-Fi security

    • 802.11 authentication options

    • When MAC authentication is used

    • Overcoming the weaknesses of WEP

    • Temporal Key Integrity Protocol (TKIP)

  • 802.1X port-based authentication

    • Comparing and contrasting WPA and WPA2

    • Distinguishing between WPA Personal and WPA Enterprise

    • Understanding 802.1X port based authentication

    • Utilizing the IEFT Extensible Authentication Protocol (EAP)

    • A quick look at common EAP authentication methods

    • Selecting a cypher
    • 4-way handshake to establish temporal keys

    • Pairwise Transient Key (PTK)

    • Advanced Encryption Standard (AES)

    • Wi-Fi Alliance certification programs

    • Defining Counter Mode with Cipher Block Chaining Protocol (CCMP)

    • Galois Counter Mode Protocol (GCMP)
  • Security Mechanism beyond 802.11i

    • Distinguishing between 802.11 and Web authentication

    • 802.11r improved key hierarchy to support fast roaming

    • Improving security with 802.11w Protected Management Frames

Supplemental information

Over time the course has evolved based on student feedback. These sections has been retired but they are still available to students.

  • Mobile network security

    • Definition of access control and its importance in mobile networks
    • GSM security mechanisms and known weaknesses
    • Security improvements in 3G UMTS
    • LTE security mechanisms and improvements
  • Network and Internet security
    • An overview of the different Internet security protocols
    • A look at Secure Sockets Layer (SSL) applications
    • Understanding Internet Protocol Security (IPsec) applications
    • Comparing and contrasting SSL and IPsec
  • Security defense tools

Course Availability:

Contact us for schedule dates and times.

View the course calendar and browse for our schedule.


Course Description, Content, Outline, and Instructional Design are Copyright ©CellStream, Inc.


Comments powered by CComment

Our Latest Content

  • Wireshark 3.5 Development Release adds significant voice upgrades

    Hi Everyone! If you are like me, you use Wireshark every day.  For me that means troubleshooting many different network

    Read More
  • Redaction Technique in Wireshark

    Here is a quick and clever technique in Wireshark. Let's say you want to present, testify, or teach about a

    Read More
  • Monitor Mode in Windows At Last

    Say it isn't true! For the first time in the world (for me) I can put a Wi-Fi interface on

    Read More
  • What does the BGP Next-Hop-Self Command Actually do?

    I got this question the other day: "What does the BGP Next-Hop-Self command actually do?" It is a great question

    Read More
  • Cool Bandwidth Monitoring in Linux

    This article will discuss how to use some cool bandwidth monitoring tools in Linux so that you have a screen

    Read More
  • 1
  • 2
  • 3
  • 4

Our Most Popular Articles

  • What is the 'arp' command, and how can I use it?

    Let's answer the question, but before I do, you can watch my ARP lesson on Youtube here: https://youtu.be/aD_caJxD7nY and look at the

    Read More
  • A Great Toolkit for Presenters - Zoomit!

    ZoomIt is a utility for the public speaker in all of us. When presenting information, sometimes it is helpful to

    Read More
  • 3 Ways to put your Wi-Fi Interface in Monitor Mode in Linux

    Check out these great references as well:   Our Wireless custom profile for Wireshark  Our Udemy course on Wireless Packet capture

    Read More
  • Neighbor Discovery (ND) Table in IPv6 Windows, Linux and MAC Machines

    Check out these additional IPv6 Resources: Our IPv6 overview course at Udemy Our IPv6 Custom Profiles for Wireshark Our IPv6

    Read More
  • T-Shark Usage Examples

    Check out these great references as well:   Our custom profiles repository for Wireshark  Our Udemy course on Wireshark   Our Udemy

    Read More
  • 1
  • 2
  • 3
  • 4

Did you learn something?
Did I save you time? 

Buy me a coffeeBuy me a coffee!

Subscribe to our Newsletter!

Subscribe to our newsletter to learn about upcoming classes, new networking how to's and much more.

Find by Tag

5G Networks 6LoWLAN 6LoWPAN 802.11 802.11ah 802.11ax 802.11ay 802.11az ACL Addressing Analysis Ansible Architecture ARP Assessment AToM Backup Bandwidth BGP Biography Bloom's Taxonomy Briefings CBRS CellStream Cellular Central Office Cheat Sheet Chrome Cisco Clock Cloud Computer Consulting CPI Data Center Data Networking Decryption DHCPv4 DHCPv6 Display Filter DNS Documentation ECMP EIGRP Ethernet Ethics Flipping the Certification Model Follow Me Fragmentation Git GNS3 Google GQUIC Hands-On History Home Network HTTPS ICMP ICMPv6 IEEE 802.11p IEEE 802.15.4 In A Day Internet IOS Classic IoT IPv4 IPv6 IS-IS L2 Switch L2VPN L3VPN LDP Learning Services Linux LLN Logging LoL M-BGP MAC MAC OSx Macro Microsoft mininet Monitoring Monitor Mode MPLS Multicast Name Resolution Netflow NetMon netsh Networking Network Science nmap Npcap nslookup Online Learning Online School OpenFlow OSPF OSPFv2 OSPFv3 OSX Parrot PIM Ping Policy POTS POTS to Pipes PPP Profile Profiles Programming Project Management PW3E Python QoS QUIC Requirements RIP Routing RPL RSVP Rural SAS SDN Security Self Certification Service Provider Services Sharepoint Small Business Smartport SONET Speed SSH SSL Subnetting T-Shark TCP TCP/IP Telco Telecom 101 Telecommunications Telephone Telnet Terminal TLS Tools Traceroute Traffic Analysis Traffic Engineering Training Travel Tunnel Utility Video Virtualbox Virtualization Voice VoIP VRF VXLAN Webex Wi-Fi Wi-Fi 6 Wi-Fi 6/6E Windows Wireless Wireless 5G Wireshark Wireshark Tip WLAN ZigBee Zoom

Twitter Feed