
Overview
Your sales force needs access to critical business data. Your employees must
stay in touch when they are traveling or working outside your corporate campus.
A wireless network maybe the best answer, but it also means risk - and you
must determine how to securely integrate your wired and wireless networks.
Learn to control access to your wireless network, maximize security, and
protect company data. Explore multiple scenarios and case studies in the
only hands-on wireless security course.
This course helps you prepare for the CWSP certification.
You'll learn:
-
How security impacts WLANs
-
The most common wireless threats and how to detect and defend against them
-
Pros and cons of wireless security implementations, including a cost/benefit
analysis
-
How to assess wireless vulnerabilities
-
How to allow ultimate flexibility for your remote workforce
Who Would Benefit
-
Administrators: network, systems, infrastructure, security, and LAN/WANs
-
Designers: network, systems, infrastructure
-
Developers: wireless software and hardware products
-
Consultants and integrators: IT, security
-
Infrastructure and IT managers, security directors, telecom managers, chief
security and officers, chief technology officers
Suggested Prerequisites:
Attendees need to have a solid understanding of TCP/IP, basic wireline and
wireless networking and protocols, firewalls, packet filtering, and basic
security policy such as that found in our Mastering TCP/IP and Integrating
Wireless Networks courses.
Look at this agenda!
Introduction to Wireless Security
-
Overview of mobility
-
What, why, where
-
The need for mobility
-
Terminals for mobility
-
Laptops
-
Pocket PC/PDA
-
Mobile phones
-
Overview of infrastructure
-
WPAN / WLAN / WWAN
-
Home, office, enterprise
-
Fixed, portable, mobile
-
Device, user, air, application
Security Briefing
-
Security concerns specific to wireless
-
Air interface vulnerabilities
-
"Like having an RJ-45 in your parking lot'
-
Low bandwidth - Sloooooow? You bet!
-
High BER
-
Limited processing power on mobiles
-
Mobile phones - restricted keyboards, limited screens, and few security-oriented
applications
-
VPN applications, virus checkers, and secure file applications
-
Security policy revisited
-
Need for general security policy
-
How does wireless access affect general security policy?
-
Sample wireless security policy addendum
-
Overview of security vulnerabilities
-
Theft of hardware
-
Authenticator management
-
Unauthorized access
-
Key attacks
-
Dictionary
-
Brute force
-
Replay
-
Race condition
-
Virus and trojan horse attacks
-
Denial of service
-
Packet sniffers
-
IP spoofing
-
Mac spoofing
-
ARP cache poisoning
-
ARP redirect
-
Man-in-the-middle
-
WEP attacks
-
Wireless security methods
-
Authentication, confidentiality, non-repudiation, availability, and integrity
-
Firewalls
-
Securing Web servers
-
SSL/TLS
-
PGP
-
Passport authentication
-
Securing applications
-
Secure shell
-
Authentication
-
AAA
-
Subscriber Information Module (SIM)
-
Smart card
-
Security dynamics
-
SecureID
-
VPN
-
Integrated VPNs
-
VPN appliances
-
PKI
-
Digital certificates
-
Certificate authorities
-
DES/3DES
-
AES
-
802.1X
-
EAP
-
Tunneling protocols for VPNs
-
PPTP
-
IPsec
-
Cisco LEAP
Wireless Local Area Network (WLAN)
-
Protocols, standards, and specs
-
IRDA
-
Open Air
-
HiperLAN
-
802.11 family
-
802.11
-
802.11a
-
802.11b
-
802.11g
-
Other 802.11 task groups
-
Securing the WLAN
-
SSID
-
Channel selection
-
War driving - unintentional eavesdropping
-
What's the matter with WEP?
-
40/64 bit
-
104/128 bit
-
Initialization vector
-
Air Snort and WEP Crack
-
Wi-Fi Protected Access (WPA)
-
802.11 BAND-AID® - TKIP
-
EAP-MD5
-
EAP-TLS
-
EAP-Cisco (LEAP)
-
EAP-TTLS
-
Protected EAP (PEAP)
-
802.11i - Robust Security Network (RPN)
-
Wireless LAN Security Checklist
Wireless Personal Area Network (WPAN)
-
802.15
-
Bluetooth overview
-
Bluetooth architecture
-
Bluetooth components
-
Bluetooth security
-
Bonding
-
Trust levels and service levels
-
Bluetooth vulnerabilities
-
Countermeasures
-
Bluetooth security checklist
Wireless Wide Area Network (WWAN)
-
Carrier side security
-
Central office security
-
Redundant VPNs
-
Everywhere a VPN
-
Customer beware
-
Only control data is encrypted
-
Device authentication and authorization
-
User authentication and authorization
-
AN-AAA, AN-AAA-DB, SN-AAA
-
AAA proxying
-
Extending the WLAN
-
High-speed wireless providers
-
802.11 hot spots
-
Mobility support
-
Mobile IP
-
Cisco mobile networks
-
Dynamic IP
-
WispR
-
Threat scenarios
-
Protecting the WLAN from the WWAN - designing the architecture
-
WAP - WML
-
WAP Gateway
-
WTLS
Course Labs:
-
Wireless Network Basic Setup
-
Pocket PC Screen Alignment
-
Initial Pocket PC Configuration
-
Install Pocket PC Applications
-
Pocket PC Lockdown
-
Pocket PC Bluetooth Configuration
-
Pocket PC Bluetooth Discovery
-
Pocket PC Bluetooth Security
-
802.11b Lab
-
Pocket PC Network Analyzer
-
Configure classroom Access Points with Security
-
Protocol Capture and Analysis
-
Demonstration of Wireless Exploits
-
Discovery Tools
-
Rogue Discovery
-
Install Cisco Wireless
-
Building the secure classroom Domain
-
Configure Cisco Wireless with WEP
-
Configure Cisco Wireless with TKIP and MIC
-
Configure Pre-Shared Key for SOHO Authentication
-
Wireless Cisco VLANs
-
Configure Cisco LEAP
-
Configure Cisco/Microsoft 802.1x
-
Configure TLS with Windows XP and Microsoft IAS
-
Protecting Wi-Fi Hot Spot Users
-
Using IPSEC/L2TP VPN Over WLAN
Special bonuses for on-line
registration!
Register from this web site and receive a complimentary* book
from the Resource Center. Choose from:
Thomas' Concise Telecom & Networking Dictionary
The Telephony Tutorials
Telecommunications Projects Made Easy
McGraw-Hill Illustrated Telecom
Dictionary
Business Telecom Systems
Microsoft Internet & Networking Dictionary
Network Tutorial
Testing Computer Telephony Systems and
Networks
* Normal shipping and handling fees apply
Registration Fees
The per student registration fee for this seminar is $2,595, and includes
the seminar, course materials, and morning and afternoon refreshments.
To register, click on the "Book Now" button or please call (708) 246-0320
Seminar
Schedule
This course is no longer available on line |
|
|
|
Click here to learn about
,
dates & locations
The Training Center opens every day at 7:30 AM. You must sign-in with the
receptionist on the first day of class. If you register less than a week
in advance of a class, please bring your confirmation letter. Classes begin
at 8:30 AM each day and conclude at 4:30 PM unless otherwise directed. Business
casual attire is appropriate.
Payment is due prior to the conference. If payment is not received,
a credit card hold will be required for participation. This card will
only be processed if payment has not been received within two weeks following
the conference.
Cancellation Policy. Registrants may cancel up to fourteen
days in advance of the seminar start date for a full refund, less administrative
fees of $500. Or, you may transfer your registration to another member
of your company at no additional charge. Registrants cancelling within
fourteen days of the seminar will receive credit, less administrative fees
of $500, toward any other Resource Center seminar. In the unlikely
event that a seminar must be cancelled, you will be notified at least one
week prior to the seminar date. Seminar provider is not responsible for losses
due to cancellation including losses on advanced purchase airfares. |