Overview
The explosion of wireless networking has given rise to a parallel explosion of increased risk, due to the ease with which out-of-box deployments can be compromised, and the lack of expertise required to get them up and running in the first place. Recent studies have shown that despite being well known, the problem of open and insecure network deployments is on the increase, and even highly publicized 'war-driving' efforts have done little to curb their growth.
This course will cover the best practice procedures for deploying wireless networks securely, as well as the tools available for both auditing and penetration testing. During the course, students will learn the history of the problems associated with wireless networking, the measures and counter measures taken along the way, and some of the more interesting phenomena surrounding the technology such as war-driving and 'free' community network projects, such as Consume in the UK and BAWUG in the USA.
We will also look at some of the less well known, but increasingly prevalent technologies such as Bluetooth, infra-red, RF and RFID, which carry with them some suprising, unexpected and interesting risks.
Subjects covered:
What to Expect
This course is a mixture of lecture and hands-on. Students will have the opportunity to see wireless auditing and hacking tools in use, as well as installing and trying them out for themselves, and there will be plenty of question and answer sessions throughout.
As well as the course notes and slides, students will leave with a CD containing all the tools and drivers used during the course.
Who Should Attend
Course Length: Two days. All course materials, lunch and two coffee breaks will be provided. A Certificate of Completion will be offered. You must provide your own laptop.
Early:
Ends |
Regular: |
Late/Onsite: |
USD |
USD |
USD |