Wireless Network Security
Request information about bringing this course to your site.
This three-day course is an experiment-oriented course that focuses on security aspects in computer and telecommunication systems. The course will cover aspects related to security policies and mechanisms, access control mechanisms (role-based, DAC, MAC, and ORCON), data encryption standards (DES, AES, Blowfish, RC4, and PKI), key management and authentication mechanisms, digital signatures (x509), message authentication codes, malicious logic (viruses, trojan horses), IPSEC, firewalls, VPN, as well as the 5 phases of a computer security attack (attack reconnaissance, scanning, gaining access, maintaining access, and covering tracks). Experiments will be conducted to show cryptanalysis techniques, x509 certificate generation, how to configure and manipulate firewalls, and all phases of a cyber attack that end in taking control of victim machine. Experiments will also be prepared to show how to break IEEE 802.11 WEP keys, launch denial of service (DoS) attacks on IEEE 802.11 networks, and how to properly secure wireless LANs using the IEEE 802.11i standard.
Students are encouraged to bring their laptop computers to class in order to participate in the exercises.
Upon completing the course you will be able to:
- Understand security policies and mechanisms and their different types.
- Understand the basic concept of operation of cryptosystems (i.e. SPNs, confusion and diffusion).
- Understand the key generation functionalities and attacks against key exchange protocols.
- Describe the basic operation of IPSEC, firewalls, and VPNs.
- Understand the different types of malicious logic and their basic concept of operation.
- Describe the different types of threats, the phases of a cyber attack, and defense techniques against each phase.
- Describe the security failures within the IEEE 802.11 protocol and how to properly secure WLANs using the IEEE 802.11i standard.
Professionals such as engineers, product developers, managers, security officers, city/state government or law enforcement professional, and network administrators who have a special interest in quickly getting up to speed with computer and telecommunication security concepts.