Thursday, December 15, 2005

Securing Wireless: Presentation Notes

Course 1 - Implementing Wireless Security

Agenda

  1. Standards Overview
  2. Considerations for Your Enterprise
    1. Regulations Compliance
    2. Data Value
    3. Public Perception
  3. Implementing Security
    1. WEP
    2. WPA
    3. WPA2/802.11i
    4. TKIP/LEAP/PEAP
    5. MAC filtering
    6. 802.1x
    7. Bluetooth
  4. Detecting Problems
    1. Rogue AP
    2. Rogue Client
    3. Attacks
    4. Failures
  5. Links
  6. Contact

Course 2 - Auditing Wireless Security

Agenda

  1. Auditing Wireless Security
  2. Discovery
    1. Kismet
    2. Netstumbler
    3. GPS Mapping
  3. Types of Attack
    1. WEP
    2. WPA
    3. LEAP
    4. Deauthentication
    5. Bluetooth
  4. Links
  5. Contact

Kismet

Netstumbler

Void11 DOS

WEP Cracking

WPA Cracking

Bluetooth Snarfing

Auditing Tutorials

LEAP Hack

No comments: