Wireless computing devices are everywhere and new products seem to
appear daily, which poses significant security risks to an
organization. As a result, network and information security staff must
understand the risks inherent in wireless computing. This course is
intended for professionals who support, design or assess IEEE 802.11
wireless environments, commonly known as Wi-Fi.
Hands-on activities are presented from the attacker’s perspective to
help learners understand a wireless attacker’s methodology. The course
will present a variety of case studies, accompanied by numerous lab
exercises to reinforce wireless security concepts and materials.
After completing this course, learners should be able to:
- Find and access wireless access points using free tools
- Identify “cloaked” or non-broadcasting access points
- Defeat common security features
- Explore brute force
attacks against WPA/WPA2-PMK
- Forcefully disassociate a
client from an access point
- Adopt best practices on how to
defeat WEP encryption
- Understand how attackers use wireless
access points as an initial entry point during a network security
- Recognize common attack vectors used after accessing a
- Discuss common misconceptions about
wireless technologies and why it can be nearly impossible to locate
Who Should Attend
Information technology, information security and corporate
investigative team members, as well as other staff members who need to
perform security audits on their wireless infrastructures.
A basic understanding of TCP/IP networks and proficiency with Linux
systems. Familiarity with computer security terminology and concepts
is also recommended.
What to Bring
On-site requirements vary based on client environment. Contact
course coordinator for specific equipment requirements.