Implementing Wireless Security in a BYOD Environment
This course explains Wi-Fi security with a focus on implementing WPA2 to meet the growing demands for BYOD. The course begins with a discussion of common wireless attacks and countermeasures, and then details the different Wi-Fi security mechanisms. It compares and contrasts the different encryption, authentication, and message authentication options to help you select the right security mechanisms for your organization.
What you'll learn
This course explains Wi-Fi security with a focus on implementing WPA2 to meet the growing demands for BYOD. The course begins with a discussion on common wireless attacks, demonstrates how you can detect these attacks, and describes the countermeasures you can put in place to protect your network. Rogue access points, DoS, and use of public hotspots are covered. The course then details the different security mechanisms defined in the 802.11 specifications, starting with the different encryption options, including the risks associated with using WEP and TKIP, and the transition to AES. There is an in-depth look at the different authentication mechanisms, including MAC, 802.1x, and Web-based authentication. The course concludes with a detailed discussion on TKIP and CCMP message authentication, and the new 802.11w mechanism that protects management frames. Details on the security changes made to support the new 802.11ac very high throughput standard are also covered.
Table of contents
- Top Wireless Security Threats When Away From the Office 3m
- Threat number 1: Password Attacks 3m
- How to Do a WPA/WPA2 Passphrase Dictionary Attack 1m
- Demonstration of WPA/WPA2 Passphrase Dictionary Attack 7m
- Countermeasures to Dictionary and Brute Force Attacks 4m
- Assigning Passphrasses 2m
- Threat Number 2: Passive Reconnaissance 3m
- How to Use Kali and Wireshark to Sniff Over-The-Air 2m
- Demonstration of Using Wireshark to Sniff Over-the-Air 3m
- Countermeasures to Protect Against Over-The-Air Eavesdroping 2m
- How to Decrypt Wi-Fi traffic in Wireshark 1m
- Demonstration of Decrypting Wi-Fi Traffic 4m
- Countermeasures to Protect Encrypted Wi-Fi Traffic 2m
- Threat Number 3: Ad Hoc Networks 3m
- How to Configure a Secure Ad Hoc Network 1m
- Demonstration of Configuring a Secure Ad Hoc Network 2m
- Preparing Your Organization for BYOD 2m