CellStream, Inc. - Telecom Consulting and Training!
1-Day Instructor Led Hands On Lab Class
Ease of sensitive and personal data access in the increasingly mobile world mean that most people in the wireless or telecommunications industries must understand how security applies to their technologies. New government and industry regulations also make security awareness mandatory in many roles across these industries.
The purpose of this course is to provide students with a detailed understanding of security in wireless networks. The course takes the student through key security mechanisms for providing wireless network access, and protecting the confidentiality and integrity of wireless traffic. It then shows how these mechanisms have been applied in Wi-Fi networks.
Once the student has an understanding of how the various wireless security networks are secured, this course details the security mechanisms defined in the Wi-Fi standards. The course explains 802.1x port based authentication and the student will gain a clear understanding of the technical difference between WPA2-Personal and WPA2-Enterprise. While most of the focus in on the 802.11i security amendment, the 802.11r 3-level key hierarchy and 802.11w, protection of management frames are also covered.
This is an instructor led technical course intended to give the student a thorough understanding of both the theoretical and practical aspects of wireless security.
At the end of the course, the student will be able to:
- Explain the core principles of wireless security
- List the security mechanisms used to protect wireless networks
- Distinguish between the various wireless security technologies
Apply key security concepts including cryptography, authentication, authorization, privacy, confidentiality, integrity, and availability in a wireless security context
Identify well-known wireless networks attacks and the security techniques that protect against these attacks
IdentifyDescribe the key features of wireless security standards and their use in today’s wireless networks including 802.1X, EAP, digital certificate, CCMP, and AES
Detail how Wi-Fi security works, including both WPA2-Personal and WPA2-Enterprise
- Recognize and describe acronyms and terminology that apply to wireless security (supplemental glossary provided by instructor)
The target audience for this course is anyone in Engineering, Test, Customer Support, Technical Marketing, or even Sales and Marketing that requires an understanding of the wireless security threats and countermeasures, and seeks to comprehend the challenges of wireless security that can be applied to their job function.
Ideal candidates are:
- IT professionals working on wireless networks
- Operations individuals that will provide wireless security configuration and support wireless services
- Network Design Engineers that need to understand wireless security
- Network Management individuals that are providing element and network management tools
- Technical sales individuals that must be able to correlate wireless security issues and threats with functionality
- Technical marketing individuals that want more than just a basic understanding of wireless security
- Certification Track individuals that need to expand their knowledge and studies
- Network Administrators
Security professionals that need a deep-dive understanding of wireless network security
This course is designed to appeal to anyone needing the skills and knowledge of the wireless security. It is highly recommended that the student first takes the wireless Wi-Fi-101 Foundation course that we offer.
Students will be provided with a Course Student Guide via the
There are a number of related courses we offer that explore the technical aspects of both today’s and tomorrow’s wireless networks.
- For students requiring an understanding to today’s and future mobile networks we offer:
- 4G 101 Foundation, available both as instructor led and self-paced
- 4G 201 Advanced, available both as instructor led and self-paced
- 5G 101 in a day, a 1 day 5G introduction - instructor led, web based delivery only
- 5G 201 in a day, an advanced 5G class - instructor led, web based delivery only
- Understanding 5G Wireless Networks, a 2 day instructor led, web based delivery only class
- Advanced 5G Network Radio and Network Concepts - a 1 day instructor led, web based delivery only class
- For students working on IoT, we have several additional courses that compare and contrast the different technologies being deployed to connect “things” to the Internet, such as:
- Enabling IoT: Wireless Low Power and Lossy Networks
- Enabling IoT: The ZigBee Protocol, available both as instructor led and self-paced
- Enabling IoT: IEEE 802.15.4 Low Rate Wireless Sensor Networks
- Enabling IoT: Wireless Access in Vehicular Environments (WAVE)
- Enabling the IoT: Next Generation 802.11 WLANs
- For students needing a technical understanding of the operation of 802.11 Wi-Fi networks we have:
- Understanding Wi-Fi 802.11 Fundamentals - a 1 day instructor led, web based delivery only class
- Wi-Fi 5 - Very High Throughput (802.11ac) - a 1 day instructor led, web based delivery only class
- Understanding Voice and Video over Wi-Fi - a 1 day instructor led, web based delivery only class
- Hands-on Wi-Fi 6/6E (802.11ax) - a 2 day instructor led, web based delivery only class
- Understanding Wi-Fi Security with WPA2 and WPA3 - a 1 day instructor led, web based delivery only class
- For students looking to learn more in general about Wireshark, check out our Wireshark classes here.
- For students looking to learn more about Wi-Fi/WLAN - check our our WLAN operations courses here.
- For students looking to learn more about IPv6 - check our our IPv6 courses here.
Wireless security threats
Network attacks from external sources
Attacks on the network from internal sources
Types of wireless attacks
Network security principles
Security terminology and concepts
The science of cryptography and cryptanalysis
- Symmetric and asymmetric cryptograph and its application
Distinguishing between shared secret and public key cryptography
Digital certificates and their usages
Illustration of X.509 digital certificate
How hash and Message Authentication Codes (MAC) are used
802.11 authentication options
When MAC authentication is used
Overcoming the weaknesses of WEP
Temporal Key Integrity Protocol (TKIP)
802.1X port-based authentication
Comparing and contrasting WPA and WPA2
Distinguishing between WPA Personal and WPA Enterprise
Understanding 802.1X port based authentication
Utilizing the IEFT Extensible Authentication Protocol (EAP)
A quick look at common EAP authentication methods
- Selecting a cypher
4-way handshake to establish temporal keys
Pairwise Transient Key (PTK)
Advanced Encryption Standard (AES)
Wi-Fi Alliance certification programs
Defining Counter Mode with Cipher Block Chaining Protocol (CCMP)
- Galois Counter Mode Protocol (GCMP)
Security Mechanism beyond 802.11i
Distinguishing between 802.11 and Web authentication
802.11r improved key hierarchy to support fast roaming
Improving security with 802.11w Protected Management Frames
Over time the course has evolved based on student feedback. These sections has been retired but they are still available to students.
Mobile network security
- Definition of access control and its importance in mobile networks
- GSM security mechanisms and known weaknesses
- Security improvements in 3G UMTS
- LTE security mechanisms and improvements
- Network and Internet security
- An overview of the different Internet security protocols
- A look at Secure Sockets Layer (SSL) applications
- Understanding Internet Protocol Security (IPsec) applications
- Comparing and contrasting SSL and IPsec
- Security defense tools
Course Description, Content, Outline, and Instructional Design are Copyright ©CellStream, Inc.