CellStream, Inc. - Telecom Consulting and Training!
2-Day Instructor Led Hands On Lab Class
Having a solid understanding of Network Security in WLAN/Wi-Fi networks is extremely important for anyone in networking, especially corporate IT and the service provider businesses, as well as individuals. Knowledge and skills with regards to network security are vital to network backbone engineers, support engineers/technicians, engineers that test these networks and equipment that is installed in these networks, as well as development engineers.
The course is a combination of knowledge training, systems analysis, with hands-on exercises using Linux based systems, designed by CellStream consultants to bring the technician/engineer, who knows a little about Security, to a deeper understanding of the terms, the tools, and the security issues. A combination of knowledge training, hands-on exercises, and hands-on experience reveals Network Security in a swift, detailed, and understandable way.
The objectives of the course are to:
- Understand security and WLAN security terminology
- Understand what hackers do to WLAN/Wi-Fi networks, and how they do it
- Develop a "hands-on" skill set targeted at WLAN/Wi-Fi Security in the following key areas:
- Security vulnerabilities and attack methods
- Possible mitigations
- Improve customer trust, security, and satisfaction by sharing the knowledge and skills to mitigate security risks
- Deepen networking knowledge and understanding
These objectives are met by covering the necessary technical bases in a straight forward manner, by keep the content in context of the objectives - connecting the dots. Utilizing a short, subject specific architecture with exercises to drive home key points and Hands-On experience that reveal these points builds skills and knowledge based on Bloom's Taxonomy. Presentation is industry current and up-to-date using a technology specialists.
The target audience for this course is anyone in the telecommunications field that requires a solid understanding of the fundamental security in WLAN/Wi-Fi networks, and desires hands-on skills that can be applied to their job function. Ideal candidates are:
- Central Office Technicians, Engineers, and Supervisors
- Line Technicians, and Customer Service Technicians
- Operations individuals that will provide IP configuration and support services
- Development Engineers that must know TCP/IP networking in order to provide hardware and software solutions
- Network Design Engineers that need to understand TCP/IP services and applications
- Network Management individuals that are providing element and network management tools
- Network Administrators and IT professionals
- Technical sales individuals that must be able to correlate features with functionality
- Technical marketing individuals that want more than just a basic understanding of IP
- Certification Track individuals that need to expand their knowledge and studies
All students must attend with a lap-top computer that has a Wi-Fi interface of recent vintage (Windows XP and later). Apple MAC laptops may not be suitable.
Students will be provided with a Course Student Guide. Also, students will be provided with a bootable USB stick that they take with them. This bootable USB stick is their lab system and does not require any use of harddrive on their laptops.
Some students have found that our approach to mastering Security provides needed skills towards acquiring further industry certifications.
The course outline is as follows:
- Section 1: Eatablishing The Groundwork
- Overview and Introductions
- Introduction/Logistics/Time Frames/Course Plan
- Accessing the Online School content
- LAB: Getting Set Up for the Lab Experiments and Exercises
- Section 2: Brief Introduction to Security and WLAN Security
- Security Terminology
- Types of Hackers
- Group Exercise: Where are vulnerabilities in an IP Network?
- Phases in Hacking
- Attack Types and Vectors
- Confidentiality, Integrity, Availability
- Malware, Malware Mitigation, Examples
- Section 3: Reconnaissance & Scanning the WLAN/Wi-Fi Network
- Web Based tools: WIGLE and SHODAN
- MAC Filtering/By-Pass, ARP Scanning
- Scanning with nmap
- LAB: Listening to the WLAN/Wi-Fi Networks
- LAB: Changing your MAC address
- LAB: Sniffing Packets off the WLAN/Wi-Fi Network
- Section 4: Access, Denial of Service, and Man In the Middle Attacks
- LAB: Jamming Users and Channels in the WLAN/Wi-Fi Environment
- LAB: Leveraging Probe Frames in the WLAN
- LAB: Hacking into Captive Portal WLAN/Wi-Fi Systems
- LAB: Cracking WEP Networks
- Section 5: Personal Security
- Personal Awareness
- Default Username/Passwords
- Personal Security – Social Engineering
- Section 6: Layer 2 and Layer 3 Mitigation
- Section 7: Layer 5 Mitigation with SSH and HTTPS
- Section 8: Other WLAN/Wi-Fi Security Tools
- LAB: The Kismet WLAN/Wi-Fi Tool
- LAB: The Wifite WLAN/Wi-Fi Tool
- Section 9: Conclusions
Course Description, Content, Outline, and Instructional Design are Copyright ©CellStream, Inc.