This course explores the security of wireless data networks. It describes the standards that govern wireless communications and security, the physics of the various approaches to wireless data security, the attacks against wireless systems, and techniques for thwarting such attacks. The course discusses the various 80.11 technologies as well as cell phone, satellite, and Bluetooth approach.
- Explain how, where, and why wireless communications are used and what wireless standards, protocols, and hardware are commonly used today.
- Identify common wireless network risks and threats to an organization and common myths of wireless security.
- Identify proper security policies for the security of wireless networks.
- Describe how an 802.11 wireless network works.
- Knowing how to properly secure a Wireless Access Point from common wireless attacks.
- Properly secure mobile devices including Blackberry, iPhone, and Android devices.
- Scan/enumerate wireless networks and capture/analyze TCP/IP packet data using a Wireless connection.
- Describe the weaknesses of WEP encryption, and how to defeat it.
- Identify attack vectors for Wireless client devices and appropriate countermeasures.
- Describe attack methods and countermeasures for WPA protected networks, as well as Bluetooth, ZigBee, and DECT wireless protocols.
- Explain how 802.1X and EAP is used to authenticate wireless devices.
- Identify the proper use of Firewalls, Network Access Control, IPSec, and Intrusion Detection to protect Wireless Networks.
YOUR OPPORTUNITY: You will learn how wireless data communications of various kinds work, how wireless data networks are configured and how to implement security technologies to protect them.
Take the Next Step
Learn more about Lewis University's online programs. Call (866) 967-7046 to speak with a Graduate Admissions Counselor or click here to request more information.