________________________________________________________________
 Do you want to take this course remotely or in person?
 Contact us by email: info@nanforiberica.com , phone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91 , or contact Our Offices
 ________________________________________________________________
           
      
    
      
      
      
          
          
          
          
  
     Course description. Security in wireless networks
 This course is taught in online mode and consists of 10 units and practices. The duration of the course is 3 0 hours That distributes between content and collaboration tools. Upon completion, the student will receive an accrediting diploma.
 Training is done through our Virtual Campus , with this modality you will have all the didactic content on the course platform and it will be accessible, from the start day of the course, 24 hours a day, every day of the week. The student will also have participation forums , as well as a continuous tutoring .
 The course is taught in teletraining modality (100% bonus option). In-person and remote training actions can also be carried out on demand.
 Course objectives
 Analyze the main aspects of WiFi technology, areas of design, configuration and implementation of the network. Know the main elements of deployment of this technology and the security factors that affect its development.
 Addressed to
 System administrators and technicians who wish to know the main aspects related to WiFi technology.
 
Course content
 Topic1 – WIFI Basics
 1.1 Basic concepts
 1.2 Advantages of WI-Fi technology. RF-based wireless technologies
 1.3 IEEE 802.11 Standards
 1.4 Technology that replaces
 1.5 Topologies and Configuration: WLAN Architectures
 1.6 Analysis of the physical layer: Electromagnetic Spectrum. Frequency Bands. Channels
 1.7 MAC Layer: Fundamentals
 Topic2 – WIFI Security
 2.1 Security mechanisms and main vulnerabilities
 2.2 Main attacks they can have: Warchalking, wardriving, parking, internet.
 2.3 VPN over Wi-Fi
 Topic 3 – Phases of a connection
 3.1 Frequency tracking
 3.2 Client authentication
 3.3 Association and data transfer
 3.4 WEP: (Wireless Equivalent Protocol)
 3.5 Data encryption
 3.6 Encrypted data frame
 3.7 Network discovery with SSID broadcast enabled
 3.8 Address-based authentication
 3.9 Address spoofing procedure
 Topic4 – WPA Scene with three scenarios
 4.1 Authentication process
 4.2 Controlled and uncontrolled ports
 4.3 TKIP: Temporal Key Integrity Protocol
 4.4 Message Integrity Check (MIC)
 4.5 WPA 2
 Topic5 – WIFI deployment
 5.1 Real benefits of WiFi technologies
 5.2 Coverage elements based on the physical layout of buildings
 5.3 Evaluation of implementation objectives
 5.4 Equipment elements
 5.5 Antennas and coverage evaluation
 5.6 Channel selection
 5.7 Implementation of security measures
 Topic6 – Types of network intruders
 6.1 Types of network intruders
 Topic7 – Types of attacks
 7.1 Types of attacks
 Topic8 – Types of intruders according to their actions
 8.1 Types of intruders according to their actions
 Topic9 – Types of malicious programs and viruses
 9.1 Types of malware and viruses
 Topic10 - What to do to avoid damage to the system?
 10.1 What to do to avoid damage to the system?
 Practice 1
 Practice2
 Final Test
 Questionnaire
 Previous requirements
 No prior technical requirements are necessary to take this course. However, basic computer skills and knowledge of environments related to Information Technology are recommended.
 Other training modalities
 If you are interested in taking this course in telepresence mode, contact us: Email: info@nanforiberica.com , Telephone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91