CellStream, Inc. - Telecom Consulting and Training!
2-Day Instructor Led Hands On Lab Class
Having a solid understanding of Network Security in Wireless and TCP/IP networks is extremely important for anyone in the service provider business. Knowledge and skills with regards to network security are vital to network backbone engineers, support engineers/technicians, engineers that test these networks and equipment that is installed in these networks, as well as development engineers.
The course is a combination of knowledge training, systems analysis, with hands-on exercises using Linux based systems, designed by CellStream consultants to bring the technician/engineer, who knows a little about Security, to a deeper understanding of the terms, the tools, and the security issues. A combination of knowledge training, hands-on exercises, and hands-on experience reveals Network Security in a swift, detailed, and understandable way.
The objectives of the course are to:
- Understand security terminology
- Understand what hackers do and how they do it
- Develop a "hands-on" skill set targeted at WLAN/Wi-Fi Security in the following key areas:
- Security vulnerabilities and attack methods
- Possible mitigations
- Improve customer satisfaction by sharing the knowledge and skills to mitigate security risks
- Deepen networking knowledge and understanding
These objectives are met by covering the necessary technical bases in a straight forward manner, by keep the content in context of the objectives - connecting the dots. Utilizing a short, subject specific architecture with exercises to drive home key points and Hands-On experience that reveal these points builds skills and knowledge based on Bloom's Taxonomy. Presentation is industry current and up-to-date using a technology specialists.
The target audience for this course is anyone in the telecommunications field that requires a solid and complete understanding of the fundamental operations of the TCP/IP protocol suite in networking, and desires hands-on skills that can be applied to their job function. Ideal candidates are:
- Central Office Technicians, Engineers, and Supervisors
- Line Technicians, and Customer Service Technicians
- Operations individuals that will provide IP configuration and support services
- Development Engineers that must know TCP/IP networking in order to provide hardware and software solutions
- Network Design Engineers that need to understand TCP/IP services and applications
- Network Management individuals that are providing element and network management tools
- Network Administrators and IT professionals
- Technical sales individuals that must be able to correlate features with functionality
- Technical marketing individuals that want more than just a basic understanding of IP
- Certification Track individuals that need to expand their knowledge and studies
All students must attend with a lap-top computer with Wireshark and VirtualBox installed. We will provide detailed instructions just prior to the class to download and install the Virtual Machine we will use for the training. Students will be required to install this Virtual Machine prior to class start.
Students will be provided with a Course Student Guide. Also, as mentioned above, a virtual machine lab system for configuration and labs will be provided.
Some students have found that our approach to mastering Security provides needed skills towards acquiring further industry certifications.
Course Outline (work in progress):
The course outline is as follows:
- Part 1: The Groundwork
- Overview and Introductions
- Introduction/Logistics/Time Frames/Course Plan
- Accessing the Online School content
- LAB: Verification of the CellStream WLAN Security Lab VM
- Part 2: Brief Introduction to WLAN Security
- Security Terminology
- Types of Hackers
- Group Exercise: Where are vulnerabilities in an IP Network?
- Phases in Hacking
- Attack Types and Vectors
- Confidentiality, Integrity, Availability
- Malware, Malware Mitigation, Examples
- Part 3: Personal Security
- Personal Awareness
- Default Username/Passwords
- Personal Security – Social Engineering
- Part 4: Security Appliances
- Part 5: Scanning, Attacks and Tools
- Scanning Using ARP - demo
- Scanning with nmap - demo
- Local Network Scan mitigation
- MAC Filtering - bypass demo
- Part 6: Layer 2 and Layer 3 Mitigation
- Part 7: Layer 5 Mitigation with SSH and HTTPS
- Part 8: Other Security Tools