IEEE 802.11 Wireless LAN Security
Beginning with introduction to Wireless LAN Security, the course provides a comprehensive overview of both theory and practice involved in 802.11 wireless security. The course provides a strong technical foundation required to implement security solutions and systems to suit your specific needs and situations. The courses presents security issues such as DoS attacks, Disclosure and Data integrity issues etc. The threats associated with the 802.11 MAC and PHY layers are analyzed. WEP and its weaknesses, advancements in security solutions like WPA, TKIP and EAP are discussed.
|Course Duration:||32 Hours|
Introduction to Security Issues in Wireless Networks, Inherent Insecurity, Short Range Wireless Systems, and WLAN Characteristics, MAC Structure, Security Threats & Considerations.
ATTACKS AND RISKS
Eavesdropping and Jamming Vulnerabilities, Attack Types, Example Networks, DoS Attacks, Man-in-the-Middle Attacks.
802.11 PHYSICAL LAYER SECURITY
RF Modulation Methods in 802.11a/b/g, Direct Sequence Spread Spectrum, Operating frequencies and Signal Spectrum, 802.11b Radio requirements, Modeling Interference and Jamming, 802.11b PHY packet structure, OFDM, 802.11a/g radio requirements, 802.11a/g jamming vulnerability, 802.11a/g PHY packet structure, MIMO methods.
802.11 MEDIUM ACCESS CONTROL SECURITY
Carrier Sense Multiple Access and throughput, Distributed Coordination Function (DCF) operation, Point Coordination Function (PCF) operation, MAC Frame Construction and Examples, IEEE 802.11e quality-of-service (QoS) operation, 802.11 management operations.
WIRED EQUIVALENT PRIVACY (WEP)
Introduction to Cryptography, Shared key and public key cryptography, Cryptanalysis attack methods, WEP encryption process and weaknesses, WEP data integrity process and weaknesses, WEP access control process and weaknesses, Denial-of-service attack methods, Bluetooth security overview and comparison to WEP.
IEEE 802.11i robust security network (RSN) overview, Temporal key integrity protocol (TKIP) operation and vulnerability, Advanced encryption standard (AES) operation and implementation, AES counter mode with cipher block chaining protocol (CCMP) operation, 802.1X extensible authentication protocol (EAP) and variants, 802.1X key distribution methods, RSN information elements, Wi-Fi protected access (WPA) operation, Security analysis and cracking tools, Virtual private network (VPN) operation.
Client Security Goals, Auditing and Logging, Security Updates, Platform Specific Examples.
ACCESS POINT SECURITY
Setting Up an Access Point, General Access Point Security and Platform Specific Examples.
Gateway Architecture, Secure Installation, Firewall Rule Creation, Auditing and Logging, MAC Filtering.