________________________________________________________________
Do you want to take this course remotely or in person?
Contact us by email: info@nanforiberica.com , phone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91 , or contact Our Offices
________________________________________________________________
Course description. Security in wireless networks
This course is taught in online mode and consists of 10 units and practices. The duration of the course is 3 0 hours That distributes between content and collaboration tools. Upon completion, the student will receive an accrediting diploma.
Training is done through our Virtual Campus , with this modality you will have all the didactic content on the course platform and it will be accessible, from the start day of the course, 24 hours a day, every day of the week. The student will also have participation forums , as well as a continuous tutoring .
The course is taught in teletraining modality (100% bonus option). In-person and remote training actions can also be carried out on demand.
Course objectives
Analyze the main aspects of WiFi technology, areas of design, configuration and implementation of the network. Know the main elements of deployment of this technology and the security factors that affect its development.
Addressed to
System administrators and technicians who wish to know the main aspects related to WiFi technology.
Course content
Topic1 – WIFI Basics
1.1 Basic concepts
1.2 Advantages of WI-Fi technology. RF-based wireless technologies
1.3 IEEE 802.11 Standards
1.4 Technology that replaces
1.5 Topologies and Configuration: WLAN Architectures
1.6 Analysis of the physical layer: Electromagnetic Spectrum. Frequency Bands. Channels
1.7 MAC Layer: Fundamentals
Topic2 – WIFI Security
2.1 Security mechanisms and main vulnerabilities
2.2 Main attacks they can have: Warchalking, wardriving, parking, internet.
2.3 VPN over Wi-Fi
Topic 3 – Phases of a connection
3.1 Frequency tracking
3.2 Client authentication
3.3 Association and data transfer
3.4 WEP: (Wireless Equivalent Protocol)
3.5 Data encryption
3.6 Encrypted data frame
3.7 Network discovery with SSID broadcast enabled
3.8 Address-based authentication
3.9 Address spoofing procedure
Topic4 – WPA Scene with three scenarios
4.1 Authentication process
4.2 Controlled and uncontrolled ports
4.3 TKIP: Temporal Key Integrity Protocol
4.4 Message Integrity Check (MIC)
4.5 WPA 2
Topic5 – WIFI deployment
5.1 Real benefits of WiFi technologies
5.2 Coverage elements based on the physical layout of buildings
5.3 Evaluation of implementation objectives
5.4 Equipment elements
5.5 Antennas and coverage evaluation
5.6 Channel selection
5.7 Implementation of security measures
Topic6 – Types of network intruders
6.1 Types of network intruders
Topic7 – Types of attacks
7.1 Types of attacks
Topic8 – Types of intruders according to their actions
8.1 Types of intruders according to their actions
Topic9 – Types of malicious programs and viruses
9.1 Types of malware and viruses
Topic10 - What to do to avoid damage to the system?
10.1 What to do to avoid damage to the system?
Practice 1
Practice2
Final Test
Questionnaire
Previous requirements
No prior technical requirements are necessary to take this course. However, basic computer skills and knowledge of environments related to Information Technology are recommended.
Other training modalities
If you are interested in taking this course in telepresence mode, contact us: Email: info@nanforiberica.com , Telephone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91