Advanced Wi-Fi security course
|
|
Conviértase en un experto en seguridad Wi-Fi
The advanced Wi-Fi security course is designed for those who are looking to develop a deeper understanding on 802.11 network security. This course is specifically designed to cover low level Wi-Fi network functionality, thus training the attendees to become protocol specialists. It also trains the students on security techniques used to detect attacks on said networks. Cutting-edge techniques, including some that are not yet released, will be explained in this course. Students will have the opportunity to learn from the experience of the best prepared instructors.
Pre-register without commitment.
|
|
Objective
Wireless (Wi-Fi) networks are a booming and ever expanding technology. This state-of-the-art technology offers cost reductions as well as simplified installations and implementations. Unfortunately, security on this type of network tends to be a secondary consideration even though the implications and risks are almost always critical.
In this very practical course, which is developed around the plethora of free software tools, students will analyze the varying forms of secure implementation and carry out case studies to execute common corporate level integrations. Target students:
IT managers and professionals working with new technologies, who are interested in learning about the different techniques used for active and passive wireless network protection.
Requirements: Basic knowledge of TCP/IP networks, Microsoft Windows and GNU/Linux. Schedule: - Wireless network vulnerabilities:
- Access: wardriving
- Tools in Microsoft Windows
- Tools in GNU/Linux
- WEP encryption
- Attacks: FSM, KoreK, etc.
- GNU/Linux attack tools
- Man-in-the-Middle attacks: Rogue APs
- What is a Rogue AP?
- Tools: Karma, Hotspotter, FakeAP rfakeap
- AP vulnerabilities in bridge mode: ARP Poisoning
- Typical scenario
- Tools: ettercap
- Denial of Service attacks
- Process of association with a Wi-Fi network
- Wireshark Wi-Fi Injection
- MDK2
- Tools: hostap + kickmac
- Classic security solutions:
- WEP
- Review of your vulnerabilities
- List for controlling access via IP or MAC
- Simple vulnerabilities to break
- Tools: airtraf, macchanger
- Beacon Frames
- Vulnerable: reassociation process
- PPower Saving DoS, Driver Hijacking...
- Authentication with Shared Key Authentication:
- Vulnerabilities specific to WEP
- Encryption:
- Modern security solutions:
- Captive portals
- What is a captive portal?
- Tools: NoCat
- 802.1x
- General overview of protocol
- Authentication systems:
- EAP: LEAP, EAP-MD5, EAP-TLS, EAP-TTLS, EAP-PEAP
- RADIUS
- WPA
- General overview of the WPA architecture
- Known attacks on different WPA versions
- 802.11i
- AES encrypted algorithm
- Hardware requirements
Pre-register without commitment.
|