certcube wireless security expert 

The Certcube Wireless Security Expert (CWSE) course will help the students to acquire the necessary skills for performing and maintaining wireless security in the industry by developing layer2 and layer3 hardware and software explications with tools from the industry’s leading corporations.

The course explains the latest industry wireless LAN protection mechanisms , beyond penetration testing techniques and Wireless Audit methodologies to the students. The course also covers the numerous up-to-date WLAN intrusion and DoS tools and techniques. The students are enabled on the functionality of the 802.11i amendment to the 802.11 standard, the inner-functioning of each authentication approach used with wireless LANs, and every class and type of WLAN protection explication available. This includes a comprehensive coverage of the corporate wireless security policies, wireless intrusion prevention systems and wireless network administration systems.

REAL LIFE CASE STUDIES

INSTRUCTOR-LED SESSIONS

INDUSTRY DRIVEN CERTIFICATION

DAILY ASSIGNMENTS

STUDENT LEARNING KIT

 

syllabus

syllabus

module 1 : wireless standards
  • Standards Organizations
    • International Organization for Standardization (ISO)
    • Institute of Electrical and Electronics Engineers (IEEE)
  • Internet Engineering Task Force (IETF)
  • Wi-Fi Alliance
  • IEEE and Wireless LAN Standards
    • The IEEE 802.11 Standard
    • The IEEE 802.11b Amendment
    • The IEEE 802.11a Amendment
    • The IEEE 802.11g Amendment
    • The IEEE 802.11n Amendment
    • Additional IEEE 802.11 Amendments
  • 802.11 Networking Basics
  • 802.11 Services
  • System Services
    • Distribution System (DS)
    • Integration Service
  • 802.11 MAC Layer Overview
  • 802.11 MAC Frame Format
  • 802.11 Management Frames
  • 802.11 Control and Data Frames
  • 802.11 System Architechure
    • Access point Architecture
    • Wireless router Architecture
    • wireless encryption methods
module 2 : wireless enterprise security
  • WLAN Authentication Overview
  • AAA
  • 802.1X
    • Supplicant
    • Authenticator Server
    • Supplicant Crediantial mechenisams
      • Username and Passwords
      • Digital Certificats
      • Smart card and USB Tokens
      • Machine Authentication
      • Biometrics
      • RFID Tags
  • Authenication Protocals
    • PAP and CHAP
    • EAP Protocol suite
  • Layer 2 Dynamic Encryption Key Generation
    • Fundamentals of Dynamic Encryption
    • Robust Security Network
    • AKM and RSNA Key Hierarchy
    • Wireless Handshakes
      • Peerkey ,4-way and Group Key
      • RSNA Security Associations
      • Passphrase-to-PSK Mapping
      • Roaming and Dynamic Keys

 

module 3 : Wireless pentest
  • Injection Test
  • Deauthentication
  • Clocking Hidden SSID
  • Handshake Capture
  • WEP Cracking
  • WEP Cracking with no client
  • WPA Attacking Essentials
  • WPA/WPA2 Attacking
  • Wirelss DOS attacks
    • Layer 1 DOS Attacks
    • Layer 2 DOS Attacks
  • Evil Twin Attack
  • Router Firmware Loopholes
  • Enterprise 802.1X Insecurities
  • Scenario Based Attacks

 

module 4 : bluetooth exploitation
  • Raspberry Pie and ESP Modules
  • Zigbee and BLE Protocols
  • Zigbee and BLE Architecture
  • Zigbee and BLE Advantage and Disadvantage
  • BLE Modulation and Channels
  • BLE Packet Format
  • GATT (GENERIC ATTRIBUTE PROFILE)
  • BLE MITM ATTACK
  • DOS attacks

.

 

module 5 : wireless audit
  • WLAN Security Audit
    • OSI Layer 1 Audit
    • OSI Layer 2 Audit amdPenetration Testing
    • Wired Infrastructure Audit
    • Social Engineering Audit
  • WIPS Audit
  • Documenting the Audit
  • Audit Recommendations
  • WLAN Security Auditing Tools
    • Linux-Based Tools
    • Windows-Based Tool

.

 

module 6 : wirless moniterning and defense
  • Wirelss Intrusion Detection and Preventation Systems
  • Device Classification and Rouge Mitigations
  • WIDS and WIPS Analysis
    • Signature-based analysis
    • Protocol-based analysis
    • Behavioral-based analysis
  • Management Frame Protection
  • 802.11r and 802.11k and 802.11w Deployment
  • VPN Technology in 802.11 Architecture
  • RADIUS Server Deployment
    • Proxy Services
    • Integration and Components
    • Deployment Architechure and Scaling
    • Multifactor Authentication
  • TACACS Server Deployment
  • EAP Encryption Gateways
  • Role Based Access Control
  • Wireless Security Policies
    • Functional Policies
    • Industry Regulations
    • PtMP and Ptp Communiacation Power Regulations

 

who should attend this training?
  • Freshers

  • Ethical hackers

  • System Administrators

  • Network Administrators

  • Engineers

  • Web admins

  • Auditors

  • Security Professionals

why should i take this training?

The era of the technology is now growing every day but due to dependency on the technology cyber frauds and attacks are also increased so to take defense for yourself and your business this is best suitable training to take entry in this domain.

pri-requisite of the training ?

The person should familiar with basic computer operations 

For more info kindly connect with us 

2 + 10 =

Our clients

Testimonials

Today I’ve completed my one 2 one online training by Mr Naresh sir from Certcube Labs .
This is the first time I have attended a class in this format and wondered how effective it would be. It was very effective and therefore I would definitely be interested in attending other classes in the same format. The instructor was very knowlegeable and provided a wealth of information about the current version, especially since the last version I used was several releases ago.
Satyam Singh

BCA, Delhi University

A good place to learn every small detail in cybersecurity.Really nice and helpful teacher.

subhum

Btech, BITS Mesra

together Let’s Create the future

9 + 7 =