Security Essentials for Wireless NetworkING

4 days training event

6100-3025

Course Outlines - Download PDF

Wireless Security RISKS

  • Authentication Attacks

  • Denial of Service DoS

  • L2 DoS

  • MAC Spoofing

  • Public Access

  • Wireless Hijacking

  • Peer to Peer Attacks

  • Management Interface Exploits

  • Rogue Devices

  • StarPlus Series System Features

Wireless Security AUDITING

  • Internal & External

  • Layer 1 Audit

  • Layer 2 Audit

  • Penetration Testing

  • Wired Infrastructure Audit

  • WIPS Audit

  • Social Engineering Audit

  • Wireless Security Auditing Tools

  • AP (for P-MP) or Base (for P-P)

  • CPE (for P-MP) or Remote (for P-P)

Wireless Security MONITORING

  • Security Sensors

  • Devices Classifications

  • Device Tracking

  • Rogue Detection

  • Alarms & Notifications

  • Signature Analysis

  • Behavioural Analysis

  • Spectrum Analysis

  • Forensic Analysis

  • Performance Analysis

Security Essentials for Wireless Networks

Wireless Security TECHNIQUES

  • Legacy Security

  • Authentication

  • Web Encryption

  • Shared Key Authentication

  • VPNs & VPN Tunneling

  • MAC Filtering

  • SSID Segmentation

  • Encryption Basics

  • TKIP, CCMP, WPA 1, 2, 3

  • AAA

  • 802.1X

  • EAP

  • Dynamic WEP

  • RSN - Robust Security Network

  • AKM - Authentication & Key Management

  • RSNA Key Hierarchy

  • Group Handshake

  • PeerKey Handshake

  • Passphrase - to PSK Mapping

  • Dynamic Keys

TRAINING LOCATIONS

أماكن ومقرات التدريب حول العالم

Dubai

Dubai

Kuala Lumpur

Kuala Lumpur

Tunis

Tunis

Istanbul

Amman

Amman

Sunny resort beach with palm tree at the coast shore of Red Sea in Sharm el Sheikh, Sinai, Egypt, Asia in summer hot. Bright sunny light

Sharm El Sheikh

Ottawa

Ottawa

Paris