Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Wireless LAN Security and Analysis

Learn WLAN protocols and security mechanisms in order to neutralize hackers.

GK# 3607

Course Overview

Tackle Wireless LAN security in this course that teaches the essential concepts and protocols from the inside out. Learn about 802.11 frame formats and transmission protocols in order to gain an understanding of where vulnerabilities might lie, and then apply that knowledge to WLAN security design concepts that make life difficult for hackers at every turn.

In addition to learning the intricacies of the 802.11 standard, WPA/WPA2, and 802.11i, you will build a secure WLAN from the ground up. You will configure and crack a series of security methods during hands-on lab exercises before a robust WPA2 Enterprise network emerges at the end of the week. You will learn to use a variety of professional grade analysis tools and open source attack tools as you test different wireless security protocols.

Delivery Format Options

  • Private Group Training

    Private Group Training

    Train your entire team in a private, coordinated professional development session at the location of your choice.

    Receive private training for teams online and in-person.

Request a date or location for this course.

What You'll Learn

  • Radio frequency modulation and signal analysis
  • Wireless security standards, including 802.11i, WPA, and WPA2
  • The 802.11 arbitration process that is used by WLAN devices for channel access
  • Detailed information about 802.11 frame formats
  • 802.11 frame types and sub-types
  • Design principles that ensure WLAN security
  • Wired Equivalent Privacy (WEP) protocols and why WEP is not secure
  • WPA protocols and how they solve the problems with WEP
  • WPA2 protocols and how they should be configured to prevent attacks
  • 802.1X/EAP methods, including which EAP type is appropriate in common WLAN deployments
  • Methods for preventing, detecting, responding to, and auditing state-of-the-art WLAN attacks
  • Wireless intrusion detection and why it's essential for maintaining a secure network

Prerequisites

Who Needs To Attend

  • Administrators: network, systems, infrastructure, security, and LAN/WLANs
  • Designers: network, systems, and infrastructure
  • Developers: wireless software and hardware products
  • Consultants and integrators: IT, wireless, and security
  • Decision makers: infrastructure managers, IT managers, security directors, chief security officers, and chief technology officers

Course Outline

Download Course Outline