Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Basics of wireless networks IEEE 802.11 standard - history, versions, principles of operation IEEE 802.11 messages - format, transmitted information, applications Devices - access points, repeaters, client stations Architecture and design of wireless networks Security mechanisms used in WiFi networks Security systems: WEP, WPA Mechanisms Encryption and Ensuring Integrity Authentication: Shared Key, IEEE 802.1x WPS - simple client connection Security issues in WiFi networks WiFi network reconnaissance - hardware and software SSID hiding and MAC address filtering - effectiveness analysis DoS attacks and affecting the performance of WEP networks - simple attacks for encryption (aircrack-ng, kismet) WEP - advanced mechanisms (Chop-Chop attacks, Caffe-Latte, fragmentation, fake authentication, replay) WPA - brute force attacks, attacks on PMKID and exploiting vulnerabilities (KRACK) WPS - implementation problems , password repeatability, brute force attacks (reaver, bully, pixiewps) How to increase password cracking efficiency? (calculations on GPU, rainbow tables) Other vulnerabilities and errors on network devices (routersploit package and others) Social engineering and fake WiFi networks (Fluxion, wifipumpkin3, WiFi Pineapple) Network security analysis packages (wash, wifite, airgeddon) IEEE authentication system 802.1x What is IEEE 802.1x and WPA-Enterprise? Authentication protocols - RADIUS, Diameter, TACACS EAP authentication methods and their weaknesses (EAP-MD5, EAP-TLS, EAP-TTLS, EAP-FAST and others) WPA-Enterprise wireless network configuration (based on FreeRADIUS server) Reconnaissance and network security WPA-Enterprise (eapeak) Securing WiFi networks IPS/IDS systems - general approach Wireless IPS Design and separation of traffic in WiFi networks How to design a secure hotspot? Physical security (RF shielding) Privacy in wireless networks - what to watch out for and what information can be obtained from WiFi?
Requirements
- knowledge of basic issues concerning computer networks (IP addressing, Ethernet, basic services - DNS, DHCP) knowledge of Windows and Linux operating systems (basic administration, system terminal)
Audience
- people responsible for the security of networks and services, network and system administrators wanting to learn about security systems, wireless network administrators, everyone interested in the subject.
21 Hours
Testimonials (7)
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
A wide range of knowledge of the lecturer.
Marcin Szklarski - Santander Consumer Bank
Course - CCSK Plus (Certificate of Cloud Security Knowledge - Plus)
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
Accessing tools and being able to ask questions to someone friendly who I felt wouldn't judge me
Kiara
Course - Open Source Cyber Intelligence - Introduction
The simple explanation of the trainer
Mohammed salem - Palestinian Police
Course - Open Source Intelligence (OSINT) Advanced
the balance between lectures and practice, the rhythm, the trainer knowledge and pedagogic skill
Armando Pinto - EID
Course - C/C++ Secure Coding
Very good knowledge and character.