Offre du Cours Wireless web
8 pages
English

Offre du Cours Wireless web

-

Le téléchargement nécessite un accès à la bibliothèque YouScribe
Tout savoir sur nos offres
8 pages
English
Le téléchargement nécessite un accès à la bibliothèque YouScribe
Tout savoir sur nos offres

Description

Wireless Hacking and defense course Account Manager : Catherine Dupont E mail : cdupont@emmera.be EMMERA TH. ROOSEVELT STR. 50 – BE 1030 BRUSSELS 02 725 95 33 02 721 12 45 INFO@EMMERA.BE 12/09/2004 Table of content Table of content............................................................................................................................2 1. Description.................................................................................3 1.1 Content ......................................................................................................................................................3 1.2 Intended audience.....................................................................................................................................3 1.3 What will you learn ? ...............................................................................................................................3 1.4 Attendees pre-requisite ............................................................................................................................4 2. Course Overview ......................................................................................................................5 2.1.Summary of the course............................................................................... ...

Informations

Publié par
Nombre de lectures 30
Langue English

Extrait

EMMERA
TH. ROOSEVELT STR. 50 – BE 1030 BRUSSELS
02 725 95 33

02 721 12 45

INFO@EMMERA.BE
Wireless Hacking and defense course
Account Manager : Catherine Dupont
E mail :
cdupont@emmera.be
12/09/2004
EMMERA
W IRELESS HACKING AND DEFENSE COURSE
PAGE
2
Table of content
Table of content
............................................................................................................................2
1. Description
.................................................................................................................................3
1.1 Content ......................................................................................................................................................3
1.2 Intended audience.....................................................................................................................................3
1.3 What will you learn ? ...............................................................................................................................3
1.4 Attendees pre-requisite ............................................................................................................................4
2. C
ourse Overview
......................................................................................................................5
2.1.Summary of the course.............................................................................................................................5
2.2 Course Outline ..........................................................................................................................................5
Introduction .............................................................................................................................................................5
Basics and Setup of Wireless Networks (AKA WLAN).........................................................................................5
Architecture of a WLAN .........................................................................................................................................5
Wireless Terminology .............................................................................................................................................5
The threats and their causes.....................................................................................................................................5
The first attacks .......................................................................................................................................................6
The first line of defense...........................................................................................................................................6
The Second Wave of Attack....................................................................................................................................6
Second line of defenses ...........................................................................................................................................6
Third Attack: The client ..........................................................................................................................................6
Third line of defense: The client side ......................................................................................................................6
Next Defense Level .................................................................................................................................................6
PDA attack methodologies ......................................................................................................................................6
3. Pricing
...........................................................................................................................................7
4. Planning
.......................................................................................................................................8
12/09/2004
EMMERA
W IRELESS HACKING AND DEFENSE COURSE
PAGE
3
1. Description
1.1 Content
The course is provided to a minimum of 6 persons, and a maximum of 10.
Price includes:
Course
Access to the practical Lab
For each attendee a laptop
All software and Operating systems needed
Course hands-on on CD
Software and tools used during the Lab on a CD
Lunch for attendee
Coffee - soft drinks.
Certificate of participation
1.2 Intended audience
;
Decision makers for security and networking, such as directors or managers of
networking, Chief Security Officers, and directors or managers of information
security.
;
Designers, architects, implementers and administrators of WLANs and security.
;
Consultants and integrators for security and IT services.
1.3 What will you learn ?
During this Hands-On course you will acquire a deep understanding of WLAN technologies
and Security. You will also spend half of the time with Hands On hacking, monitoring and
defending wireless network in our Lab, You will also train on the monitoring tools and on
AP's configuration.
Each chapter will be followed by practical example and training. Each hacking demo will be
plasticized by the student. Each security measure will be discussed, applied and tested by
the students.
This course is a real Hacking and defense course, with a lot of practical experiences.
12/09/2004
EMMERA
W IRELESS HACKING AND DEFENSE COURSE
PAGE
4
1.4 Attendees pre-requisite
Due to the very technical aspect of this course, each student need to have already a ground
understanding of the following topics :
Networking topologies and technologies
Basic knowledge of Linux and Microsoft Operating systems
TCP/IP
Basic of security.
T
he student must have at leave 3 years of proven experience in IT.Participants have to prove their
real appertain to an IT and/or Security services of the company who pay for the course. A coppy of
the ID card (or passport) and a letter from his management will be requested too. Those precautions
are taken to avoid that a would-be hacker participate to this course.
12/09/2004
EMMERA
W IRELESS HACKING AND DEFENSE COURSE
PAGE
5
2. C
ourse Overview
2.1.Summary of the course
-
How does a WLAN Work?
-
How Intruders penetrate the Lan via the WLAN,
-
How to hack and protect a WLAN
-
How to Identify and prevent WLAN threads
-
How to make a good Security policy for your WLAN
-
How to make a Secure WLAN
-
How to make a Site security survey
2.2 Course Outline
Introduction
Training overview
Agenda
Practical
Lab overview
Basics and Setup of Wireless Networks (AKA WLAN)
History
Standards in Wifi and 802.11x Technology
Other standards
Some statistics.
Architecture of a WLAN
Design, hardware
The media
Radio Frequency basics
Antennas
Common design
Wireless Terminology
SSID
AP
BEACON ...
The threats and their causes
Against AP
Against Network
Against Client
12/09/2004
EMMERA
W IRELESS HACKING AND DEFENSE COURSE
PAGE
6
The first attacks
Sniffing
Association
AP modification
Wardriving
The first line of defense
Ap configuration
WEP
WPA
Mac Filtering
The Second Wave of Attack
WEP cracking
Theorical WPA cracking
MAC Spoofing
DOS Attack
Second line of defenses
Stronger Encryption, WPA
Cisco LEAP protocol
Authentification , EAP, 802.1x
Dos mitigation
Third Attack: The client
Association
Sniffing
Share
Third line of defense: The client side
Personal Firewall
Detection
Good practices ,Configuration
Next Defense Level
Gateway
IDS, Rogue Access Point detection
Monitoring
Policy, Education
Radius VPN
WLAN Management
PDA attack methodologies
Stumbling
Sniffing
Wardriving, or rather “warwalking”
12/09/2004
EMMERA
W IRELESS HACKING AND DEFENSE COURSE
PAGE
7
3. Pricing
Closed session course
This training is done only for the members of an enterprise. It can be adapted
on measure. The course is calculated for 6 participants, and we accept a
maximum of 8 attendees. Session will be held in English, French or Dutch.
Description
Price Excl.
VAT
Fixed fee for 6
persons
4 days training in our fully
equipped classroom. Lunch and
coffee included
8200 €
Per added attendee
(max 2)
4 days training in our fully
equipped classroom. Lunch and
coffee included
1100 €
Open session course
Made for any IT and network specialist this session is open for candidate from
different companies. A maximum of 8 participants will be accepted. Session will
be held in English, French or Dutch.
Participants
Descriptif
Price Excl.
VAT
Per attendee’s fee
4 days training in our fully
equipped classroom. Lunch and
coffee included
1850 €
A minimum of 5 confirmed inscriptions is mandatory to make the training.
Be careful that any inscriptions must be confirmed by payment of the course’s fee minimum 3 weeks
before the session’s duration.
12/09/2004
EMMERA
W IRELESS HACKING AND DEFENSE COURSE
PAGE
8
4. Planning
Open sessions will be planned in
November January March.
Contact us for more details :
www.emmera.be
cdupont@emmera.be
  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents