Securing Wireless Networks
4-day seminar, including hands-on labs, $2,595
Register online and get a free book!

Dates, Locations and Registration


Contact Center Seminars
Telecom Seminars

Help Desk Books
Call Center Management
Tech Support Resources
Contact Center Technology
Online Support
Customer Satisfaction
Knock Your Socks Off
Help Desk Institute
Telecom Books
Communication Skills
Call Center Monitoring
Metrics & Benchmarking
Hiring, Training, & Retention
Outbound Telebusiness
Novelties, Gifts, & Humor
Bargain Books (50% off)

Subject Index
Catalog Index

Shipping Options
About Us
Contact Us


Your sales force needs access to critical business data. Your employees must stay in touch when they are traveling or working outside your corporate campus. A wireless network maybe the best answer, but it also means risk - and you must determine how to securely integrate your wired and wireless networks.

Learn to control access to your wireless network, maximize security, and protect company data. Explore multiple scenarios and case studies in the only hands-on wireless security course.

This course helps you prepare for the CWSP certification.

You'll learn:

  • How security impacts WLANs

  • The most common wireless threats and how to detect and defend against them

  • Pros and cons of wireless security implementations, including a cost/benefit analysis

  • How to assess wireless vulnerabilities

  • How to allow ultimate flexibility for your remote workforce

Who Would Benefit

  • Administrators: network, systems, infrastructure, security, and LAN/WANs

  • Designers: network, systems, infrastructure

  • Developers: wireless software and hardware products

  • Consultants and integrators: IT, security

  • Infrastructure and IT managers, security directors, telecom managers, chief security and officers, chief technology officers

Suggested Prerequisites:

Attendees need to have a solid understanding of TCP/IP, basic wireline and wireless networking and protocols, firewalls, packet filtering, and basic security policy such as that found in our Mastering TCP/IP and Integrating Wireless Networks courses.

Look at this agenda!

Introduction to Wireless Security

  • Overview of mobility
    • What, why, where
    • The need for mobility
    • Terminals for mobility
    • Laptops
    • Pocket PC/PDA
    • Mobile phones
  • Overview of infrastructure
    • WPAN / WLAN / WWAN
    • Home, office, enterprise
    • Fixed, portable, mobile
    • Device, user, air, application

Security Briefing

  • Security concerns specific to wireless
    • Air interface vulnerabilities
    • "Like having an RJ-45 in your parking lot'
    • Low bandwidth - Sloooooow? You bet!
    • High BER
    • Limited processing power on mobiles
    • Mobile phones - restricted keyboards, limited screens, and few security-oriented applications
    • VPN applications, virus checkers, and secure file applications
  • Security policy revisited
    • Need for general security policy
    • How does wireless access affect general security policy?
    • Sample wireless security policy addendum
  • Overview of security vulnerabilities
    • Theft of hardware
    • Authenticator management
    • Unauthorized access
    • Key attacks
    • Dictionary
    • Brute force
    • Replay
    • Race condition
    • Virus and trojan horse attacks
    • Denial of service
    • Packet sniffers
    • IP spoofing
    • Mac spoofing
    • ARP cache poisoning
    • ARP redirect
    • Man-in-the-middle
    • WEP attacks
  • Wireless security methods
    • Authentication, confidentiality, non-repudiation, availability, and integrity
    • Firewalls
    • Securing Web servers
    • SSL/TLS
    • PGP
    • Passport authentication
    • Securing applications
    • Secure shell
    • Authentication
    • AAA
    • Subscriber Information Module (SIM)
    • Smart card
    • Security dynamics
    • SecureID
    • VPN
    • Integrated VPNs
    • VPN appliances
    • PKI
    • Digital certificates
    • Certificate authorities
    • DES/3DES
    • AES
    • 802.1X
    • EAP
    • Tunneling protocols for VPNs
    • PPTP
    • IPsec
    • Cisco LEAP

Wireless Local Area Network (WLAN)

  • Protocols, standards, and specs
    • IRDA
    • Open Air
    • HiperLAN
    • 802.11 family
      • 802.11
      • 802.11a
      • 802.11b
      • 802.11g
      • Other 802.11 task groups
  • Securing the WLAN
    • SSID
    • Channel selection
    • War driving - unintentional eavesdropping
    • What's the matter with WEP?
    • 40/64 bit
    • 104/128 bit
    • Initialization vector
    • Air Snort and WEP Crack
    • Wi-Fi Protected Access (WPA)
    • 802.11 BAND-AID® - TKIP
      • EAP-MD5
      • EAP-TLS
      • EAP-Cisco (LEAP)
      • EAP-TTLS
      • Protected EAP (PEAP)
    • 802.11i - Robust Security Network (RPN)
    • Wireless LAN Security Checklist

Wireless Personal Area Network (WPAN)

  • 802.15
    • Bluetooth overview
    • Bluetooth architecture
    • Bluetooth components
    • Bluetooth security
    • Bonding
    • Trust levels and service levels
    • Bluetooth vulnerabilities
    • Countermeasures
    • Bluetooth security checklist

Wireless Wide Area Network (WWAN)

  • Carrier side security
    • Central office security
    • Redundant VPNs
    • Everywhere a VPN
    • Customer beware
    • Only control data is encrypted
    • Device authentication and authorization
    • User authentication and authorization
    • AAA proxying
  • Extending the WLAN
    • High-speed wireless providers
    • 802.11 hot spots
    • Mobility support
    • Mobile IP
    • Cisco mobile networks
    • Dynamic IP
    • WispR
    • Threat scenarios
    • Protecting the WLAN from the WWAN - designing the architecture
    • WAP - WML
    • WAP Gateway
    • WTLS

Course Labs:

  1. Wireless Network Basic Setup
  2. Pocket PC Screen Alignment
  3. Initial Pocket PC Configuration
  4. Install Pocket PC Applications
  5. Pocket PC Lockdown
  6. Pocket PC Bluetooth Configuration
  7. Pocket PC Bluetooth Discovery
  8. Pocket PC Bluetooth Security
  9. 802.11b Lab
  10. Pocket PC Network Analyzer
  11. Configure classroom Access Points with Security
  12. Protocol Capture and Analysis
  13. Demonstration of Wireless Exploits
  14. Discovery Tools
  15. Rogue Discovery
  16. Install Cisco Wireless
  17. Building the secure classroom Domain
  18. Configure Cisco Wireless with WEP
  19. Configure Cisco Wireless with TKIP and MIC
  20. Configure Pre-Shared Key for SOHO Authentication
  21. Wireless Cisco VLANs
  22. Configure Cisco LEAP
  23. Configure Cisco/Microsoft 802.1x
  24. Configure TLS with Windows XP and Microsoft IAS
  25. Protecting Wi-Fi Hot Spot Users
  26. Using IPSEC/L2TP VPN Over WLAN

Special bonuses for on-line registration!

Register from this web site and receive a complimentary* book from the Resource Center. Choose from:

Click here to learn more! Thomas' Concise Telecom & Networking Dictionary
Click here to learn more The Telephony Tutorials
Click here to learn more Telecommunications Projects Made Easy
McGraw-Hill Illustrated Telecom Dictionary
Business Telecom Systems
Click for more information! Microsoft Internet & Networking Dictionary
Click here to learn more! Network Tutorial
Testing Computer Telephony Systems and Networks

* Normal shipping and handling fees apply

Registration Fees
The per student registration fee for this seminar is $2,595, and includes the seminar, course materials, and morning and afternoon refreshments.

To register, click on the "Book Now" button or please call (708) 246-0320

Seminar Schedule
This course is no longer available on line

Click here to learn about Click here to see the entire seminars calendar, dates & locations

The Training Center opens every day at 7:30 AM. You must sign-in with the receptionist on the first day of class. If you register less than a week in advance of a class, please bring your confirmation letter. Classes begin at 8:30 AM each day and conclude at 4:30 PM unless otherwise directed. Business casual attire is appropriate.

Payment is due prior to the conference.  If payment is not received, a credit card hold will be required for participation.  This card will only be processed if payment has not been received within two weeks following the conference.

Cancellation Policy.  Registrants may cancel up to fourteen days in advance of the seminar start date for a full refund, less administrative fees of $500.  Or, you may transfer your registration to another member of your company at no additional charge.  Registrants cancelling within fourteen days of the seminar will receive credit, less administrative fees of $500, toward any other Resource Center seminar.  In the unlikely event that a seminar must be cancelled, you will be notified at least one week prior to the seminar date. Seminar provider is not responsible for losses due to cancellation including losses on advanced purchase airfares.

The Resource Center for Customer Service Professionals
Tel: (708) 246-0320   Fax: (708) 246-0251  

Copyright © 2004-2006  Resource Center for Customer Service Professionals, LLC.  All rights reserved.
Last modified April 27, 2006