Realtime website analytics

 

 

ADVANCE YOUR CAREER - Earn More, Be More than Certified
Q/ISP IA CyberSecurity Qualified Certification


Qualified Wireless Analysis & Defender QWAD

GOT YOUR CWNA & CWSP? Now Get Qualified..
QWAD Power of Analysis, WLAN Pentration Testing, Wireless Assessment, Hacking & Defending.


Analyzing and Pen Testing Wireless Networks
3 days of hands-on intense wireless tools for scanning, securing and assessing enterprise-class wireless LANs. Case studies, demos and labs address in detail, 802.11 frame structure and exchange processes, wireless LAN performance, wireless assessments, security analysis, wireless LAN troubleshooting and new exclusive EKAHAU TRAINING and CERTIFICATION.

Hacking & Defending Wireless Networks
2-days of hacking wireless in detail, how to break 802.11 its vulnerabilities & how to fix.
•  Weaknesses and vulnerabilities of open wireless networks
•  Packet analysis & locating wireless rogue access points- AirMagnet demo, ATNS, WIPS, Tipping PT
•  Available counter measures and solutions to stop the wireless leaks
•  How to defend your wireless LAN from hackers (AirTight Networks Sentry & AirDefense)
•  Demos incl: deflecting wireless jamming & data flooding, spoofing and more.

Bottom line: You'll leave knowing how to Pen Test, assess and defend your network from wireless hacking and how to locate unauthorized wireless access points before the hacker takes over your wireless network .

Class Fee: $4,690 for 1 week classes
Time: 8:00am - 6pm
Location: Click here to view the class schedule
Learning Level: Understanding of TCP/IP protocols
CPE Credits: 45
Prerequisites: Before taking this class, participants have practical wireless experience
   
Method of Delivery - Residential On Ground
Method of Evaluation: 1. 95 % attendance 2. 100 % completion of Lab
Grading: Pass = 95% Attendance and 100% Completion of Labs and Practical
Fail => 95% Attendance and > 100% Completion of Labs and Practical

Qualified Wireless Analysis Defender QWAD

Students who complete the class will acquire the necessary skills for pentesting, analyzing and troubleshooting any wireles LAN implementation. You will gain extensive hands-on training installing, configuring, and utilizing five market-leading analysis products: and can take the QWAD exam

Class labs:

Air Defense

Take the Guesswork Out of Wireless LAN Design & Management
Download a 15-Day Trial Version
of AirDefense Architect

 

Airtight Networks

Find Rogues Quickly with Precise Location Tracking
SpectraGuard Enterprise shuts down unauthorized Wi-Fi

Precisely locate any access point or client

Display rogue devices for quick removal
Unique probability graph shows location
Optional integration with SpectraGuard Planner


Ekahau Site Survey Training and Certification

easy planning, quick site surveys, state-of-the-art visual representation, and advanced analysis, optimization, and reporting features.

T301 Ekahau Wi-Fi Location Tag
Leveraging the award-winning Ekahau Positioning Engine (EPE) software platform..
More information

Ekahau Positioning Engine
Combining the latest 802.11 wireless networking technology with location info...
More information

Ekahau Site Survey
One of the distinctive strengths of the Ekahau Site Survey 2.2 (ESS) is its p...
More information


AirTight Networks' SpectraGuard Enterprise has key elements of an effective wireless intrusion prevention system (WIPS):
detecting and correctly classifying wireless threats – to catch all threats, while minimizing false alarms
preventing (multiple, simultaneous) wireless threats – while continuing to scan for new ones
accurately locating the wireless threats on a floor map – so they can be removed.
Most Robust Wireless Threat Prevention

Full visibility of both the air space and the wired network

Unique Network Detector mode lowers costs
Proper identification of External APs
The following list contains the materials covered in the lecture portion of the course:
Physical Layer
  • PLCP and PMD Sub-layers
  • PLCP header fields and subfields
DCF Mode
  • Interframe Spacing
  • Backoff Algorithms
  • Frame exchange processes
PCF Mode
  • Media access rules
  • Frame exchange processes
MAC frame fields and subfields

MAC layer addressing
  • BSS
  • ESS
  • WDS
802.11e topical coverage

Wired connectivity standards for
access points and bridges
  • 802.1h
  • RFC1042
Using wireless LAN
protocol analyzers
  • Performance analysis
  • Security analysis
  • Distributed analysis
  • Protocol decode analysis
  • Site Surveying
  • Application Analysis
Use of 802.11 series of
standards terminology
  • MPDU
  • MMPDU
  • MSDU
  • PPDU
  • PSDU
   
 

AirMagnet Strategic Wireless LAN Design

+ Survey Planner

Design your WLAN infrastructure from the ground up. Determine the correct number, placement and configuration of APs required to deliver full coverage for all end users.

+ Survey
+ Survey PRO

Build the ideal wireless LAN by capturing live RF data during your site survey and simulating accurate "what-if" scenarios.

Anytime, Anywhere WLAN Troubleshooting

+ Laptop Analyzer
+ Handheld Analyzer

Make sense of end-user complaints to quickly resolve performance problems, while automatically detecting hundreds of network vulnerabilities and security threats.

Anytime, Anywhere Voice over Wi-Fi Troubleshooting

+ VoFi Analyzer

Automatically identify the root causes of Voice over Wi-Fi problems.

Anytime, Anywhere Layer 1 Troubleshooting

+ Spectrum Analyzer

Gain true intelligence into Layer 1 of your WLAN.

Dedicated Performance & Security Monitoring

+ Enterprise

When security is critical and resources are precious, get dedicated, continuous monitoring of all your locations with this highly-scaleable "smart-edge" sensor architecture.

Remote Troubleshooting for Aruba

+ Enterprise Analyzer for Aruba

Remotely troubleshoot devices and other sources of Wi-Fi performance issues from one central location without the need for any new hardware.

Hacking & FIXING Wireless Networks Class Topics
•  Weakness and vulnerabilities of open wireless networks
•  Packet analysis & locating wireless rogue access points- AirMagnet demo
•  Available counter measures and solutions to stop the wireless leaks with AirTighNetworks IPS.
•  How to break and fix your wireless LAN to keep out hackers
•  Demos incl: wireless jamming & data flooding, spoofing, scanning and more.

Bottom line: You'll leave knowing how to defend your network from wireless hacking and how to locate unauthorized wireless access points before the hacker takes over your wireless network .

Air Defense
Colubris Networks
Cisco Systems
Ekahau
Fortress Technologies
Cognio

Proxim
Symbol Technologies
Funk Software
Microsoft
TamoSoft
Zoom Telephonics

SafeNet
System Tools
Van Dyke Software
Wireshark
IPSwitch
YDI
Meru

Hacking Wireless networks is 2 days of wireless hacking and workshops

  • Packet Analysis & Spoofing
  • Rogue Hardware & Default Settings
  • RF Jamming & Data Flooding
  • Information Theft
  • Wireless Hijacking and DoS Attacks
  • Access Point VPNs
  • Scanning & Assessing Wireless networks
  • Security + Wireless (LEAP to all)
  • Layered Wireless Security
  • Layer 3 Switching & Security
  • 802.1x and EAP-TTLS
  • SSH2 Tunneling & Local Port Redirection

Class Outline

Risk Assessment

  • Assets to protect
  • Threats to protect against
  • Legal protection
  • Costs
  • Basic security measures
  • Threat analysis
  • Impact analysis

Threat Analysis & Scanning Methodology

  • Target profiling
  • Physical security
  • Social engineering
  • Wireless scanning
  • Packet analysis
  • Information theft
  • Malicious data insertion
  • Denial of Service (DoS)
  • Peer-to-peer hacking
  • Unauthorized control

Rudimentary Security Measures

  • SSID
  • MAC filters
  • Static WEP
  • Default configurations
  • Firmware upgrades
  • Physical security
  • Periodic inventory

Intermediate Security Measures

  • Rogue equipment
  • Cell sizing
  • Protocol filters
  • SNMP
  • Discovery protocols
  • Wireless segment configuration
  • Remove vulnerabilities
  • Client security
  • IP Services

Advanced Security Measures

  • Wireless security policy
  • Authentication & encryption
  • Wireless DMZ and VLANs
  • Audits
  • Traffic pattern analysis
  • Authenticated DHCP

Wireless LAN Auditing Tools

  • Discovery tools
  • Password crackers
  • Share enumerators
  • Network management
    and control
  • Wireless protocol analyzers
  • Manufacturer defaults
  • Password sniffers
  • Antennas and WLAN equipment
  • OS fingerprinting and
    port scanning
  • Application sniffers
  • Networking utilities
  • Network discovery and management
  • Hijacking users
  • RF Jamming and
    Dataflooding tools
  • WEP crackers

Hardware & Software Solutions

  • RADIUS with AAA Support
  • RADIUS Details
  • Kerberos
  • Static and Dynamic WEP and TKIP
  • 802.1x
  • Extensible Authentication Protocol (EAP)
  • VPNs
  • Encryption Schemes
  • Routers
  • Switch-Routers
  • Firewalls
  • MobileIP VPN Solutions
  • Enterprise Wireless Gateways
  • Switches, VLANs, & Hubs
  • SSH2 Tunneling & Port Redirection
  • Thin Client Solutions

Prevention & Countermeasures

  • 802.1x
  • 802.11i
  • TKIP
  • AES
  • Intrusion detection
  • US Federal and state laws

Implementation and Management

  • Design and implementation
  • Equipment configuration and placement
  • Interoperability and layering
  • Security management

*Class fees are subject to change

 

 
Current Schedule
Site Map SU Policies Webmaster Contact Us Opt-Out Testimonials Advertise Brochure
Copyright © 2014 Security University, Inc. All rights reserved.
Translate this page to