Price: $2,999.00

Course Number: 9072
Length: 3 Days
Print Friendly, PDF & Email

Wireless Security Training

While wireless networking provides many advantages, it also comes with security threats that can alter an organization’s overall information security risk profile.

Although implementation of technological solutions is the usual response to wireless security threats and vulnerabilities, some might argue that wireless security is primarily a management issue.

Effective management of the threats associated with wireless technology requires a sound and thorough assessment of risk given the environment and development of a plan to mitigate identified threats regardless of the wireless medium – satellites to Bluetooth.

Given the scope of wireless technologies today, it’s no wonder protecting them has become an involved and arduous endeavor.

Wi-Fi, one of the most popular wireless technologies is also the modality most likely to be tapped into by cybercriminals. Wi-Fi access points and routers can provide hackers with a convenient way in.

That’s because Wi-Fi signals are often broadcast beyond the walls of buildings and homes and out into the streets — an enticing invitation for hackers.

Becoming a wireless and mobile security expert, requires a comprehensive understanding of wireless and mobile technologies, knowledge on threats and exploits, and efficient defense techniques.

One of the least understood wireless security defense techniques is called wireless ethical hacking.

An ethical hacker is an information security expert who systematically attempts to penetrate a computer system, network, application or other computing resource on behalf of its owners to find security vulnerabilities that a malicious hacker could potentially exploit.

An ethical hacker uses techniques similar to what a cyber criminal might use to penetrate an organization’s data information.

Learn all about this and much more …

Wireless Security Training Course by Tonex

Wireless Security Training includes Wireless Ethical Hacking, Penetration Testing, and Defenses covering all aspect of wireless technologies.  This is a comprehensive course covering wireless technologies, security, vulnerabilities, threats, exploits, and the defense techniques and technologies. Understand the attackers and the the enemies including thrill seekers and wardrivers, bandwidth thieves and knowledgeable attackers. Learn about elements of security including the techniques used for authentication, ciphering, encryption and identity protection.

As the wireless and mobile networks shift to all IP-based networks, the infrastructures become increasingly exposed to advanced threats designed to steal information or impact service availability and quality.

To become a wireless and mobile security expert, you need to have a comprehensive understanding of wireless and mobile technologies, knowledge on threats and exploits and the defense techniques.

Our Wireless Security Training course provides hands-on exercises in evaluating and attacking wireless and mobile networks including WiFi, Bluetooth, Zigbee, RFID, GSM, CDMA, UMTS, LTE, Microwave, SATCOM and VSAT. We will expose you to the wireless and mobile security threats from the perspective of attackers and hackers.

Students will learn about:

  • Wireless Network Architecture
  • Overview of Security Technologies
  • Wireless Security Fundamentals
  • Wireless Security Techniques
  • Wireless Security Exposed
  • Wireless Security Strategies and Implementation
  • Wireless Data Collection
  • WiFi MAC Protocol Analysis
  • Wireless Tools
  • Wireless Information Analysis
  • Concepts behind Crypto
  • Encryption, Authentication, Integrity, and Access Control
  • Concepts behind Enterprise Attacks
  • Advanced Wi-Fi Attack Techniques
  • Unauthorized access
  • Ad-hoc network security
  • Identity theft (MAC spoofing)
  • Man-in-the-middle attacks
  • Denial of Service (DoS)
  • Network injection
  • Caffe Latte attack
  • Security measures
  • 802.11 Security
  • Bluetooth, BLE, DECT and ZigBee Security and Attacks
  • Cellular and Mobile Network Security and Attacks: GSM, CDMA, UMTS/HSPA+, LTE, LTE-A Pro, and 5G
  • Microwave, Satellite Communications and VSAT Security and Attacks
  • Wireless Security Strategies and Implementation
  • Wireless Risk Mitigation

Wireless Security Training

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.