Our Courses

1-Day Instructor Led 
Available in either Web Based Delivery or On-Site Delivery
Web Based Delivery: Max class size is 30
On Site Delivery: Max class size is 20

Course Description:

Ease of sensitive and personal data access in the increasingly mobile world mean that most people in the wireless or telecommunications industries must understand how security applies to their technologies. New government and industry regulations also make security awareness mandatory in many roles across these industries.

The purpose of this course is to provide students with a detailed understanding of security in wireless networks.  The course takes the student through key security mechanisms for providing wireless network access, and protecting the confidentiality and integrity of wireless traffic. It then shows how these mechanisms have been applied in Wi-Fi networks.

Once the student has an understanding of how the various wireless security networks are secured, this course details the security mechanisms defined in the Wi-Fi standards.  The course explains 802.1x port based authentication and the student will gain a clear understanding of the technical difference between WPA2-Personal and WPA2-Enterprise. While most of the focus in on the 802.11i security amendment, the 802.11r 3-level key hierarchy and 802.11w, protection of management frames are also covered.

This is an instructor led technical course intended to give the student a thorough understanding of both the theoretical and practical aspects of wireless security.

Course Objectives:

At the end of the course, the student will be able to:

  • Explain the core principles of wireless security
  • List the security mechanisms used to protect wireless networks
  • Distinguish between the various wireless security technologies
  • Apply key security concepts including cryptography, authentication, authorization, privacy, confidentiality, integrity, and availability in a wireless security context

  • Identify well-known wireless networks attacks and the security techniques that protect against these attacks

  • IdentifyDescribe the key features of wireless security standards and their use in today’s wireless networks including 802.1X, EAP, digital certificate, CCMP, and AES

  • Detail how Wi-Fi security works, including both WPA2-Personal and WPA2-Enterprise

  • Recognize and describe acronyms and terminology that apply to wireless security (supplemental glossary provided by instructor)

Audience:

The target audience for this course is anyone in Engineering, Test, Customer Support, Technical Marketing, or even Sales and Marketing that requires an understanding of the wireless security threats and countermeasures, and seeks to comprehend the challenges of wireless security that can be applied to their job function.

Ideal candidates are:

  • IT professionals working on wireless networks
  • Operations individuals that will provide wireless security configuration and support wireless services
  • Network Design Engineers that need to understand wireless security
  • Network Management individuals that are providing element and network management tools
  • Technical sales individuals that must be able to correlate wireless security issues and threats with functionality
  • Technical marketing individuals that want more than just a basic understanding of wireless security
  • Certification Track individuals that need to expand their knowledge and studies
  • Network Administrators
  • Security professionals that need a deep-dive understanding of wireless network security

Course Prerequisites:

This course is designed to appeal to anyone needing the skills and knowledge of the wireless security. It is highly recommended that the student first takes the wireless Wi-Fi-101 Foundation course that we offer.

Course Materials:

Students will be provided with a Course Student Guide via the Online School of Network Sciences as well as many course reference materials.

Related Content:

There are several related courses that explore the technical aspects of both today’s and tomorrow’s wireless networks.

 

Course Outline:

  • Wireless security threats

    • Network attacks from external sources

    • Attacks on the network from internal sources

    • Types of wireless attacks

    • Network security principles

  • Security terminology and concepts

    • The science of cryptography and cryptanalysis

    • Symmetric and asymmetric cryptograph and its application
    • Distinguishing between shared secret and public key cryptography

    • Digital certificates and their usages

    • Illustration of X.509 digital certificate

    • How hash and Message Authentication Codes (MAC) are used 

  • Wi-Fi security

    • 802.11 authentication options

    • When MAC authentication is used

    • Overcoming the weaknesses of WEP

    • Temporal Key Integrity Protocol (TKIP)

  • 802.1X port-based authentication

    • Comparing and contrasting WPA and WPA2

    • Distinguishing between WPA Personal and WPA Enterprise

    • Understanding 802.1X port based authentication

    • Utilizing the IEFT Extensible Authentication Protocol (EAP)

    • A quick look at common EAP authentication methods

    • Selecting a cypher
    • 4-way handshake to establish temporal keys

    • Pairwise Transient Key (PTK)

    • Advanced Encryption Standard (AES)

    • Wi-Fi Alliance certification programs

    • Defining Counter Mode with Cipher Block Chaining Protocol (CCMP)

    • Galois Counter Mode Protocol (GCMP)
  • Security Mechanism beyond 802.11i

    • Distinguishing between 802.11 and Web authentication

    • 802.11r improved key hierarchy to support fast roaming

    • Improving security with 802.11w Protected Management Frames

Supplemental information

Over time the course has evolved based on student feedback. These sections has been retired but they are still available to students.

  • Mobile network security

    • Definition of access control and its importance in mobile networks
    • GSM security mechanisms and known weaknesses
    • Security improvements in 3G UMTS
    • LTE security mechanisms and improvements
  • Network and Internet security
    • An overview of the different Internet security protocols
    • A look at Secure Sockets Layer (SSL) applications
    • Understanding Internet Protocol Security (IPsec) applications
    • Comparing and contrasting SSL and IPsec
  • Security defense tools

Course Availability:

Contact us for schedule dates and times.

View the course events calendar and browse for our schedule.

Comments powered by CComment

Event Booking Mini Calendar

March   2019
S M T W T F S
          1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31