What about this course?
Module 1 - WLAN Security Basics: This module discusses the need for Wi-Fi security and provides the background of decision and standards making bodies. It also discusses 802.11 in the Enterprise. Module 2 - Wifi Attack Vectors: This module discusses typical modes of attack on Wi-fi implementations. It also underlines the fact that different attack methods expose the vulnerability of the Wi-Fi network. Module 3 - 802.11 Security Design Considerations: This module describes the need for performing a risk assessment as well as establishing a security policy. It also discusses management and monitoring of the enterprise Wi-fi network. Module 4 - 802.11 Authentication: This module details the different 802.11 authentication methods used from password based to enterprise based. It provides details on the complexities of more stringent authentication methods.
Instructor for this course
This course is composed by the following modules
802.11 and the OSI Model
The need for Wi-Fi security
802.11 Standards & Regulation Bodies
802.11 in the Enterprise
Risk Assessment & Security Policy
Mobile Device Management (MDM)
Client Centric Authentication
WEP and its Weaknesses
WPAv1 and its Weaknesses
WPA2 and KRACK vulnerability
Threat Identification and Classification
Logging and Reporting
Wireless Intrusion Detection Systems and Prevention
Voice Client Constraints
EAP-FAST Analysis (real-time)
EAP-TLS Analysis (real time)
Rogue Discovery (real time)
Common Course Questions
If you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below.
If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?
Are the training videos downloadable?
I only want to purchase access to one training course, not all of them, is this possible?
Are there any fees or penalties if I want to cancel my subscription?