We're offering 20% off September Live Online classes! See which courses are applicable.   |   Details

  
AccountIcon BigDataIcon BlogIcon default_resource_icon CartIcon checkmark_icon cloud_devops_icon computer_network_admin_icon cyber_security_icon gsa_schedule_icon human_resources_icon location_icon phone_icon plus_icon programming_software_icon project_management_icon redhat_linux_icon search_icon sonography_icon sql_database_icon webinar_icon

Search UMBC Training Centers

Computer and Network Administration

Wireless Networking II: Security and Analysis

Group Training + View more dates & times

                 
Overview

This course reinforces and expands on the topics cover in the Wireless Networking I: Integration and Troubleshooting course. The main areas of focus are wireless local area network (WLAN) security and analysis. Students will review the components that comprise a WLAN and expand on that knowledge to understand how WLAN are used in larger networks. Wireless network security is a core topic area with material covering robust secure networks (RSN) and encryption in small office, home office and larger enterprise deployments. Students will understand dynamic key generation and the hierarchy of keys as a result. Students will be able to categorize 802.11 frame types and analyze networks examining connections for performance.

Who Should Take This Course

Prerequisites

Wireless Networking I: Integration and Troubleshooting.

Why You Should Take This Course

Objectives

Upon completion of this course, the student will be able to:

  • Name the components of wireless links and WLAN infrastructure
  • Categorize and dissect 802.11 frames
  • Explain legacy approaches to wireless security and the shortfalls
  • Understand encryption as it applies to WLANs
  • Define how robust secure networks are created
  • Address current wireless security concerns
  • Analyze wireless networks for quality of connections, signal strength, and performance
  • Describe how roaming occurs and the effects on quality of service traffic
  • Implement WLAN troubleshooting practices
Schedule
Course Outline

Schedule

Day 1 – WLAN Components and Topologies; Security Standards; Client Devices and Access Points; MAC Architecture, Terminology and Frames

Day 2 – Security Infrastructure; Legacy Security; Encryption; Dynamic Key Generation

Day 3 – Preshared Keys; 802.1X and EAP; RADIUS and LDAP; Security Risks and Threats

Day 4 – BYOD and Guest Accesses; WLAN Auditing and Analysis; Wireless Security Monitoring; Roaming; WLAN Troubleshooting; Policies

Outline

  1. Name the components of wireless links and WLAN infrastructure
    1. Recall WLAN components and topologies
    2. Identify client devices and access point types
    3. Summarize the WLAN standard and protocols
    4. Describe the components that build the security infrastructure
  2. Categorize and dissect 802.11 frames
    1. Distinguish where 802.11 traffic fits into the OSI model and how it translates to other mediums or standards
    2. Name the wireless protocol data units are each layer
    3. Differentiate between wireless frame types
    4. Extract WLAN frame details from captures
  3. Explain legacy approaches to wireless security and the shortfalls
    1. Authentication mechanisms
    2. Wired equivalent privacy (WEP)
    3. WEP workarounds
    4. Legacy security implementations
  4. Understand encryption as it applies to WLANs
    1. Classify algorithms and methods
  5. Define how robust secure networks are created
    1. Map the creation of dynamic keys from a preshared or master session key
    2. Define the components of a robust secure network
    3. Explain how port-based security complements extensible authentication methods
    4. Describe how RADIUS and LDAP integrate into an enterprise network
  6. Address current wireless security concerns
    1. Identify security threats and types of attacks against wireless networks
    2. Summarize mobile device management and guest access controls
  7. Analyze wireless networks for quality of connections, signal strength, and performance
    1. Recall protection mechanisms and their effect on throughput and performance
    2. Discuss ways to analyze the RF environment to detect signal interference
    3. Explain ways to audit layer two connections
    4. State industry compliance standards for secure wireless networks
    5. Identify ways to monitor the security of wireless networks
  8. Describe how roaming occurs and the effects on quality of service
    1. State how clients roam between access points
    2. Differentiate between roaming methods in an enterprise
    3. Explain how latency in roaming affects quality of service
  1. Implement WLAN troubleshooting practices
    1. State the approaches to solving WLAN problems
    2. Identify problems with key generation in small and larger networks
FAQs
Is there a discount available for current students?

UMBC students and alumni, as well as students who have previously taken a public training course with UMBC Training Centers are eligible for a 10% discount, capped at $250. Please provide a copy of your UMBC student ID or an unofficial transcript or the name of the UMBC Training Centers course you have completed. Asynchronous courses are excluded from this offer.

What is the cancellation and refund policy?

Student will receive a refund of paid registration fees only if UMBC Training Centers receives a notice of cancellation at least 10 business days prior to the class start date for classes or the exam date for exams.

Contact Us