Security Essentials for Wireless NetworkING
4 days training event
6100-3025
Wireless Security RISKS
Authentication Attacks
Denial of Service DoS
L2 DoS
MAC Spoofing
Public Access
Wireless Hijacking
Peer to Peer Attacks
Management Interface Exploits
Rogue Devices
StarPlus Series System Features
Wireless Security AUDITING
Internal & External
Layer 1 Audit
Layer 2 Audit
Penetration Testing
Wired Infrastructure Audit
WIPS Audit
Social Engineering Audit
Wireless Security Auditing Tools
AP (for P-MP) or Base (for P-P)
CPE (for P-MP) or Remote (for P-P)
Wireless Security MONITORING
Security Sensors
Devices Classifications
Device Tracking
Rogue Detection
Alarms & Notifications
Signature Analysis
Behavioural Analysis
Spectrum Analysis
Forensic Analysis
Performance Analysis
Wireless Security TECHNIQUES
Legacy Security
Authentication
Web Encryption
Shared Key Authentication
VPNs & VPN Tunneling
MAC Filtering
SSID Segmentation
Encryption Basics
TKIP, CCMP, WPA 1, 2, 3
AAA
802.1X
EAP
Dynamic WEP
RSN - Robust Security Network
AKM - Authentication & Key Management
RSNA Key Hierarchy
Group Handshake
PeerKey Handshake
Passphrase - to PSK Mapping
Dynamic Keys
TRAINING LOCATIONS
أماكن ومقرات التدريب حول العالم
Dubai
Kuala Lumpur
Tunis
Istanbul
Amman
Sharm El Sheikh
Ottawa
Paris