• Telecommunications Consulting

    Telecommunications Consulting

    Consulting Services from Network Design to Project Management Read More
  • Internetworking Training Experts

    Internetworking Training Experts

    Click on Training and then Courses. Read More
  • Wireshark Experts

    Wireshark Experts

    Packet analysis expertise is critical in today's networks, and being able to use the best packet analyzer application is a skill we can help you and your team attain. Read More
  • Are you a Network Scientist?

    Are you a Network Scientist?

    Online Learning, Instructor Led in person or Web-based delivery. Check out our online school. Read More
  • Online Certification Training

    Online Certification Training

    Find out about our Network Self Certification Program for Rural Service Providers here! Read More
  • IPv6 Experts

    IPv6 Experts

    Along with other Internet regions, ARIN is out of IPv4 Addresses. Are you IPv6 fluent? Are you IPv6 ready? Read More
  • Enabling the IoT with Wireless

    Enabling the IoT with Wireless

    Without wireless, we cannot have the Internet of Things. Read More
  • MPLS Book for iPad and iPhone

    MPLS Book for iPad and iPhone

    Get Mr. Walding's book here! Read More
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8

Welcome to CellStream, Inc. - Telecom Consulting and Training!

Welcome to our home on the Internet, where we can not only share information, but also interact with each other. If you are a visitor to the site, there are a number of things to view: our FAQ'sNetworking and Computing Tips, our CellStream Blog, and other fun reading can all be found in the drop down menus above.  The Training menu provides access to our courses, our course calendar, and learning services.  The Consulting Menu provides information on our consulting services and a place to meet our consulting and teaching team.  Registered CellStream folks and our clients will log in using their private credentials to access projects, calendars and discussions.

Thanks for visiting! We always welcome comments and suggestions.

CellStream Logo trim plus TM 150x50  

CellStream, Inc. - Telecom Consulting and Training!            

1-Day Instructor Led Hands On Lab Class
Available in Web Based delivery 
Minimum 10 students - Maximum 30 students

 

Course Description:

Ease of sensitive and personal data access in the increasingly mobile world mean that most people in the wireless or telecommunications industries must understand how security applies to their technologies. New government and industry regulations also make security awareness mandatory in many roles across these industries.wifi security small

The purpose of this course is to provide students with a detailed understanding of security in wireless networks.  The course takes the student through key security mechanisms for providing wireless network access, and protecting the confidentiality and integrity of wireless traffic. It then shows how these mechanisms have been applied in Wi-Fi networks.

Once the student has an understanding of how the various wireless security networks are secured, this course details the security mechanisms defined in the Wi-Fi standards.  The course explains 802.1x port based authentication and the student will gain a clear understanding of the technical difference between WPA2-Personal and WPA2-Enterprise. While most of the focus in on the 802.11i security amendment, the 802.11r 3-level key hierarchy and 802.11w, protection of management frames are also covered.

This is an instructor led technical course intended to give the student a thorough understanding of both the theoretical and practical aspects of wireless security.

Course Objectives:

At the end of the course, the student will be able to:

  • Explain the core principles of wireless security
  • List the security mechanisms used to protect wireless networks
  • Distinguish between the various wireless security technologies
  • Apply key security concepts including cryptography, authentication, authorization, privacy, confidentiality, integrity, and availability in a wireless security context

  • Identify well-known wireless networks attacks and the security techniques that protect against these attacks

  • IdentifyDescribe the key features of wireless security standards and their use in today’s wireless networks including 802.1X, EAP, digital certificate, CCMP, and AES

  • Detail how Wi-Fi security works, including both WPA2-Personal and WPA2-Enterprise

  • Recognize and describe acronyms and terminology that apply to wireless security (supplemental glossary provided by instructor)

Audience:

The target audience for this course is anyone in Engineering, Test, Customer Support, Technical Marketing, or even Sales and Marketing that requires an understanding of the wireless security threats and countermeasures, and seeks to comprehend the challenges of wireless security that can be applied to their job function.

Ideal candidates are:

  • IT professionals working on wireless networks
  • Operations individuals that will provide wireless security configuration and support wireless services
  • Network Design Engineers that need to understand wireless security
  • Network Management individuals that are providing element and network management tools
  • Technical sales individuals that must be able to correlate wireless security issues and threats with functionality
  • Technical marketing individuals that want more than just a basic understanding of wireless security
  • Certification Track individuals that need to expand their knowledge and studies
  • Network Administrators
  • Security professionals that need a deep-dive understanding of wireless network security

Course Prerequisites:

This course is designed to appeal to anyone needing the skills and knowledge of the wireless security. It is highly recommended that the student first takes the wireless Wi-Fi-101 Foundation course that we offer.

Course Materials:

Students will be provided with a Course Student Guide via the Online School of Network Sciences as well as many course reference materials.

Related Content:

There are several related courses that explore the technical aspects of both today’s and tomorrow’s wireless networks.

 

Course Outline:

  • Wireless security threats

    • Network attacks from external sources

    • Attacks on the network from internal sources

    • Types of wireless attacks

    • Network security principles

  • Security terminology and concepts

    • The science of cryptography and cryptanalysis

    • Symmetric and asymmetric cryptograph and its application
    • Distinguishing between shared secret and public key cryptography

    • Digital certificates and their usages

    • Illustration of X.509 digital certificate

    • How hash and Message Authentication Codes (MAC) are used 

  • Wi-Fi security

    • 802.11 authentication options

    • When MAC authentication is used

    • Overcoming the weaknesses of WEP

    • Temporal Key Integrity Protocol (TKIP)

  • 802.1X port-based authentication

    • Comparing and contrasting WPA and WPA2

    • Distinguishing between WPA Personal and WPA Enterprise

    • Understanding 802.1X port based authentication

    • Utilizing the IEFT Extensible Authentication Protocol (EAP)

    • A quick look at common EAP authentication methods

    • Selecting a cypher
    • 4-way handshake to establish temporal keys

    • Pairwise Transient Key (PTK)

    • Advanced Encryption Standard (AES)

    • Wi-Fi Alliance certification programs

    • Defining Counter Mode with Cipher Block Chaining Protocol (CCMP)

    • Galois Counter Mode Protocol (GCMP)
  • Security Mechanism beyond 802.11i

    • Distinguishing between 802.11 and Web authentication

    • 802.11r improved key hierarchy to support fast roaming

    • Improving security with 802.11w Protected Management Frames

Supplemental information

Over time the course has evolved based on student feedback. These sections has been retired but they are still available to students.

  • Mobile network security

    • Definition of access control and its importance in mobile networks
    • GSM security mechanisms and known weaknesses
    • Security improvements in 3G UMTS
    • LTE security mechanisms and improvements
  • Network and Internet security
    • An overview of the different Internet security protocols
    • A look at Secure Sockets Layer (SSL) applications
    • Understanding Internet Protocol Security (IPsec) applications
    • Comparing and contrasting SSL and IPsec
  • Security defense tools

Course Availability:

Contact us for schedule dates and times.

View the course events calendar and browse for our schedule.

Comments powered by CComment

Our Latest Content

  • Tweaking the Wireless Interface - Power Settings, Country etc. in Linux

    I ws asked in a recent WLAN class whether you can adjust the power level in a Wi-Fi radio.  The

    Read More
  • The Evolving Networking Skill Set

    It used to be pretty simple to adopt and learn the necessary knowledge and skills for a career in the field

    Read More
  • A Terminal Version of T-Shark - we love it!

    Just introduced this week is a terminal version of T-Shark that looks like the Wireshark GUI call termshark. Why? Let's

    Read More
  • How To Observe if the Web Site you are Browsing Uses QUIC

    How do you know if a given web site uses QUIC/GQUIC?  It is a great question, and can be easily

    Read More
  • 3 Ways to put your Wi-Fi Interface in Monitor Mode in Linux

    If you are like me, you count on the Internet to help with how to's especially when using Linux.  That

    Read More
  • 1
  • 2
  • 3
  • 4

Our Most Popular Articles

  • What is the 'arp' command, and how can I use it?

    Let's answer the question.  If you want more details than what we have provided below, check out our chapter on

    Read More
  • Neighbor Discovery (ND) Table in IPv6 Windows, Linux and MAC Machines

    A great question I was asked in class was: "If Neighbor Discovery processes have replaced ARP in ICMPv6, how do

    Read More
  • IPv6 Windows Command Line Examples

    Here are some great Windows command line entries you can make to examine and configure IPv6 (assuming your version of

    Read More
  • A List of Network Monitoring Tools for Network and System Administrators

    Monitoring, analyzing, managing, and diagraming a network can often be a huge problem for Network and System Administrators.  They are

    Read More
  • How do I reset my "Default" profile in Wireshark?

    This is a commonly asked question that usually results from users learning the can have different profiles after they have

    Read More
  • 1
  • 2
  • 3
  • 4

Event Booking Mini Calendar

July   2019
S M T W T F S
  1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 31      

Subscribe to our Newsletter!

Find by Tag

4G Networks 5G Networks 6LoWLAN 6LoWPAN 802.11 802.11ah 802.11ax 802.11ay 802.11az Addressing Analysis Ansible Architecture ARP Assessment AToM Baseline BGP Bloom's Taxonomy Broadband Cable cat CellStream Cellular Central Office Cheat Sheet Chrome Cisco Cloud CMD Coloring Rules Computer Consulting Customer Support Data Center Data Networking DHCPv6 DNS Docker Documentation Dublin-Traceroute dumpcap ECMP Ethernet Ethics Evaluation Field Operations Fragmentation G-MPLS GeoIP Git GNS3 Google GQUIC Hands-On History Home Network ICMP ICMPv6 IEEE 802.11p IEEE 802.15.4 India Interface Control Internet IoT IPsec IPv4 IPv6 IRINN IS-IS L2VPN L3VPN LDP Linux LLN LoL M-BGP MAC Macro Microsoft mininet Monitoring MPLS mtr MTU Multicast Name Resolution Netcat Netmiko NetMon netsh Networking Network Science nmap NSE Observations Online School OpenFlow OSPF OSPFv2 OSPFv3 OSX OTT Paris-Traceroute Parrot PIM PMTU Policy POTS POTS to Pipes PPP Profile Programming Project Management PW3E Python QoS QUIC Remote Desktop Requirements Resume Review RIP Routing RPL RSVP Rural SDN Security Service Provider Small Business SONET Speed SS7 SSH SSL Subnetting SYSCTL T-Shark TCP TCP/IP Telco Telecom 101 Telecommunications Telephone termshark Testing TLS Tools Traceroute Traffic Engineering Training Travel Tunnel Ubuntu Utility Video Virtualbox Virtualization VoIP VRF VXLAN Wi-Fi Wi-Fi 4 Wi-Fi 5 Wi-Fi 6 Windows Wireless Wireless 5G Wireshark Wireshark Tip WLAN Writing Zenmap ZigBee

Twitter Feed