Security in wireless networks

| /


Do you want to take this course remotely or in person?

Contact us by email: , phone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91 , or contact Our Offices


Course description. Security in wireless networks

This course is taught in online mode and consists of 10 units and practices. The duration of the course is 3 0 hours That distributes between content and collaboration tools. Upon completion, the student will receive an accrediting diploma.

Training is done through our Virtual Campus , with this modality you will have all the didactic content on the course platform and it will be accessible, from the start day of the course, 24 hours a day, every day of the week. The student will also have participation forums , as well as a continuous tutoring .

The course is taught in teletraining modality (100% bonus option). In-person and remote training actions can also be carried out on demand.

    Course objectives

    Analyze the main aspects of WiFi technology, areas of design, configuration and implementation of the network. Know the main elements of deployment of this technology and the security factors that affect its development.

    Addressed to

    System administrators and technicians who wish to know the main aspects related to WiFi technology.


    Course content

    Topic1 – WIFI Basics

    1.1 Basic concepts

    1.2 Advantages of WI-Fi technology. RF-based wireless technologies

    1.3 IEEE 802.11 Standards

    1.4 Technology that replaces

    1.5 Topologies and Configuration: WLAN Architectures

    1.6 Analysis of the physical layer: Electromagnetic Spectrum. Frequency Bands. Channels

    1.7 MAC Layer: Fundamentals

    Topic2 – WIFI Security

    2.1 Security mechanisms and main vulnerabilities

    2.2 Main attacks they can have: Warchalking, wardriving, parking, internet.

    2.3 VPN over Wi-Fi

    Topic 3 – Phases of a connection

    3.1 Frequency tracking

    3.2 Client authentication

    3.3 Association and data transfer

    3.4 WEP: (Wireless Equivalent Protocol)

    3.5 Data encryption

    3.6 Encrypted data frame

    3.7 Network discovery with SSID broadcast enabled

    3.8 Address-based authentication

    3.9 Address spoofing procedure

    Topic4 – WPA Scene with three scenarios

    4.1 Authentication process

    4.2 Controlled and uncontrolled ports

    4.3 TKIP: Temporal Key Integrity Protocol

    4.4 Message Integrity Check (MIC)

    4.5 WPA 2

    Topic5 – WIFI deployment

    5.1 Real benefits of WiFi technologies

    5.2 Coverage elements based on the physical layout of buildings

    5.3 Evaluation of implementation objectives

    5.4 Equipment elements

    5.5 Antennas and coverage evaluation

    5.6 Channel selection

    5.7 Implementation of security measures

    Topic6 – Types of network intruders

    6.1 Types of network intruders

    Topic7 – Types of attacks

    7.1 Types of attacks

    Topic8 – Types of intruders according to their actions

    8.1 Types of intruders according to their actions

    Topic9 – Types of malicious programs and viruses

    9.1 Types of malware and viruses

    Topic10 - What to do to avoid damage to the system?

    10.1 What to do to avoid damage to the system?

    Practice 1


    Final Test


    Previous requirements

    No prior technical requirements are necessary to take this course. However, basic computer skills and knowledge of environments related to Information Technology are recommended.

    Other training modalities

    If you are interested in taking this course in telepresence mode, contact us: Email: , Telephone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91

    Information related to training

    Soporte siempre a tu lado

    Training support: Always by your side

    Formación presencial y telepresencial

    Do you need another training modality?


    Bonuses for companies