This five-day hands-on practical training course is designed to provide a comprehensive practical coverage of IEEE802.11 Wireless LAN Security, passing on the necessary skills for implementing and managing wireless security in the enterprise using layer 2, layer 3 and layer 7 products from the industry’s leading manufacturers.

This is a Planet3 Wireless INC course delivered in partnership with a Planet3 Authorised Partner.

Target Audience

  • Systems and Network Administrators, Engineers and Analysts
  • Technical Support and Implementation Engineers
  • IT Security Professionals,Technical Consultants, Network Architectures

Objectives

Prerequisites

Course Outline

Risk Assessment

Assets to protect

Threat Analysis and Hacking Methodology

Rudimentary Security Measures

Intermediate Security Measures

Advanced Security Measures

Wireless LAN Auditing Tools

Hardware and Software Solutions

Prevention and Countermeasures

Implementation and Management

  • Understand in-depth the vulnerabilities inherent in 802.11 wireless networks.
  • Demonstrate the risks of Packet Analysis and MAC address Spoofing.
  • Demonstrate the dangers of Rogue Hardware and Default Settings for WLAN equipment.
  • Demonstrate the effects of RF Jamming and Data Flooding, and describe how to counter these threats.Demonstrate the susceptibility of wireless-enabled laptops to Peer attacks and corporate Information Theft.
  • Employ Cisco LEAP and 802.1x/EAP for secure Wireless bridge links
  • Employ VPN technologies for layered security in Wireless bridge links.
  • Design and configure Access Point-based VPNs using PPTP, IPSec, VPN Pass-through and VPN Hopping.
  • Configure and demonstrate VPN roaming across access points.
  • Configure and demonstrate SSH2 Tunneling and Local Port
    • CWNA Certification
    • Threats to protect against
    • Legal protection
    • Costs
    • Basic security measures
    • Threat analysis
    • Impact analysis
    • Target profiling
    • Physical security
    • Social engineering
    • Wireless bridges
    • Packet analysis
    • Information theft
    • Malicious data insertion
    • Denial of Service (DoS)
    • Peer-to-peer hacking
    • Unauthorized control
    • SSID
    • MAC Filters
    • Static WEP
    • Default Configurations
    • Firmware Upgrades
    • Physical SecurityPeriodic Inventory
    • Rogue Equipment
    • Cell Sizing
    • Protocol filters
    • SNMP
    • Discovery protocols
    • Wireless Segment Configuration
    • Remove Vulnerabilities
    • Client Security
    • IP Services
    • Wireless Security Policy
    • Authentication and encryption
    • Wireless DMZ and VLANs
    • Audits
    • Traffic Pattern Analysis
    • Authenticated DHCP
    • Discovery Tools
    • Password Crackers
    • Share enumerators
    • Network Management and Control
    • Wireless protocol analyzers
    • Manufacturer defaults
    • Password sniffres
    • Antennas and WLAN equipment
    • OS fingerprinting and port scanning
    • Application sniffers
    • Networking utilities
    • Network Discovery and management
    • Hijacking users
    • RF Jamming and Data flooding tools
    • WEP crackers
    • Radius with AAA Support
    • Radius Details
    • Kerberos
    • Static and Dynamic WEP and TKIP
    • 802.1x
    • Extensible Authentciation Protocol (EAP)
    • VPNs
    • Encryption Schemes
    • Routers
    • Switch-Routers
    • Firewalls
    • MobileIP VPN Solutions
    • Enterprise Wireless Gateways, Switches, Vlans and Hubs
    • SSH2 Tunneling and Port Redirection
    • Thin Client Solutions
    • 802.1x
    • 802.11i
    • TKIP
    • AES
    • Intrusion detection
    • US Federal and state laws
    • Design and Implementation
    • Equipment Configuration and placement
    • Interoperability and layering
    • Security Management

EquiTrain –a pision of Equinox International- equips organizations with IT skills that are the lifeblood of modern corporate life, as Theyll as the professional expertise required for ensuring productivity and to remain competitive now and tomorrow.

At EquiTrain, They tailor end-to-end training solutions that incorporate both IT and business consultancy to the specific needs of each inpidual customer. They can equip yTheir IT professionals with all they need to quickly maximize yTheir new technology investments as Theyll as pushing forward absolute beginners on their road to IT proficiency.

They offer a broad range of IT and Management training cTheirses and certifications from top technology vendors with a choice of on-site or offsite, public or closed and local or abroad training. Their portfolio of cTheirses is supplemented by Their strategic training alliance with world's leading providers of learning solutions.

See all Equitrain courses

Contact information not available.

Courses you can instantly connect with...
Making Powerful Presentations Career Development Organization Soft Skills Native Egyptians Training & Consulting Services Creativity and Innovation Kovay

Is this the right course for you?

Rate our content

Didn't find what you were looking for ?

or