Wednesday, May 16, 2018 8:00 AM - 5:00 PM Wi Fi/WLAN Fundamentals Training by Tessco; Day Two of a Two Day Training. (Attendees must bring laptop computers for this training. Attendees should bring available Wi-Fi test instruments for performing signal analysis.) Speaker: Dane Brockmille. Tessco Room: 342 D Training Description: This course will provide an overview of Wi-Fi standards and technologies and will give the student the ability to layout out and design a wireless network, configure wireless routers and wireless network adapters, add security to wireless networks, and to use the wireless network. An overview of Wi-Fi standards Training Abstract: You will Learn: _ Wireless Network fundamentals _ Wireless Network Architecture _ Different Wireless Standards _ How to deploy Wireless Hotspots and connect the WLAN to the WAN _ How to Secure a Wireless Network _ How to Measure Wireless Performance and Signal Strength _ How to Configure computers to connect to a Wireless Network Prerequisites: None, however a data fundamentals course is extremely helpful. Course Content: 1. Wired Network Review 2. Wired Network Hardware 3. Wired Network Protocols 4. TCP/IP 5. Ethernet 6. Wireless Network Architecture 7. Wireless Basics 8. RF Communication 9. Network Design 10. Transporting Data 11. Ethernet and IP packets 12. 802.11 and Wi-Fi 13. IEEE 14. Wi-Fi Alliance 15. Wireless LANs (Wi-Fi Standards) 16. Radio Standards and Bands
17. 802.11a 18. 802.11b iii. 802.11g 802. 802.11n 803. 802.11ac 804. Security Standards 805. WEP 806. 802.11i-2003 (WPA) iii. 802.11i-2004 (WPA2) 1. 802.1x (RADIUS Authentication) 2. Interference Control Standards (802.11h) 3. 802.11h - Dynamic Frequency Selection (DFS) 4. 802.11h - Transmit Power Control (TPC) 5. Wireless Access Point Operating Modes 6. Router/AP 7. AP Only 8. Repeater 9. Mesh Node 10. Bridge Mode 11. Deploying Hotspots 12. Wireless Networking Equipment 13. Routers, Wired and Wireless 14. Switches, Wired and Wireless 15. Wireless Access Points 16. Repeaters 17. Mesh Nodes 18. Power over Ethernet (PoE) 19. Configuring Access Points 20. Managed APs, Lightweight APs 21. Local Connection Configuration 22. Configuration via Wireless Connection 23. Maintenance IP Address 24. Endpoint Connection Methods 25. Built-in Adapters 26. Removable Adapters 27. Single vs. Multiple Access points 28. Basic Service Set (BSS) and Extended Service Set (ESS) 29. SSID 30. Allowable Characters 31. Hidden or Broadcast iii. SSID Naming Conventions 1. Multiple SSIDs on the Same AP 2. Channel Assignment 3. Static 4. Dynamic 5. Signal interference
6. Address Assignment 7. IP Addresses: Same LAN or Isolated LAN 8. MAC Addresses: BSSIDs iii. Basic Radio MAC Address 1. Virtualized MAC Addresses 2. Other WLANs 3. WISP 4. WiMAX 5. Internet Connectivity 6. ISP requirements 7. Wireless LAN Controller (WLC) 8. Channel Management 9. AP Groups 10. Roaming and Handoffs 11. Performance Measurement 12. Distance Limitations 13. Interference Issues 14. Signal Strength and Throughput 15. WLAN Throughput 16. Testing Internet Connectivity 17. Measuring Internet Throughput 18. Measuring LAN Throughput 19. Measuring Wireless Throughput 20. Monitoring performance 21. WLAN Security 22. Threats to the WLAN 23. Access Control 24. Wireless VLAN 25. Understanding Wireless Encryption 26. Wired Equivalent Privacy (WEP) 27. Wi-Fi Protected Access (WPA and WPA2) 28. Pre-Shared Key (PSK) and Radius Authentication 29. Client Isolation 30. Steps to a Secure Wireless Network 31. Configuring Network Computers 32. Installing network adapters 33. TCP/IP properties 34. Network clients 35. File and Printer sharing 36. Domains and Workgroups 37. Internet Connection (Hardware) Firewalls 38. Software Firewalls 39. Voice and Video over Wi-Fi 40. Without Roaming 41. With Roaming 42. Equipment Interoperability Problems 43. Mixing Vendors 44. Mixing Protocols 45. Hands-on Labs (done throughout the course) Level of Training:
Who should Attend: Wireless Networking Engineers IT Staff IT Managers Wireless Network Support Personnel Anyone interested in learning more about configuring and maintaining Wi-Fi networks 10:00 AM - 12:00 PM Communication System Design Basics - From GIS to Network Buildout Training by End 2 End Technologies Speaker: Cody Racette, End 2 End Technologies Room: 342 A Training Description: Discovering and discussing what information needs to be gathered about company assets before implementing field wireless communications systems.this training is or Telecommunications Engineers, Supervisors, Managers, Field personnel involved in planning & decision making. This session will cover GIS data and various software tools, various RF propagation tools, as well as the necessary questions to ask your team before providing a solution. Training Abstract: Slide show presentation with real software examples of GIS and RF propagation tools in action. Real world examples of stumbling blocks at each step of the design process. Point to Point, Point to multipoint, and Mesh radio systems will be discussed. Unlicensed as well as Licensed frequency bands will also be covered. Training Objectives: What Information gathering is required during the planning phase of a Field Network System Design. What software tools are available to analyze GIS data for your field and manipulate it into useful information for a network buildout. What software tools are available to model field wireless networks to provide an implementation plan and realistic coverage/connectivity expectations when deploying your network. Level of Training: Beginner, Intermediate 10:00 AM - 3:00 PM (12-1 break for lunch) Resources and Tools for Cyber Security Testing Training by Berkana Resources (Attendees must bring their laptop computers for this training) Instructor: Graham Speake, Berkana Resources Room: 342 E
Training Description: This training session will look at and demonstrate useful tools that are readily available (often open source) to enable attendees to gain an understanding of cyber security techniques or allow more advanced users a roadmap to setting up a lab. Training Abstract: There are many tools available that can enhance the knowledge of engineers who need or want experience in the area of industrial cyber security. While the tools available are often those used in the IT world, knowing how they can be applied to the industrial space and the associated risk factors can prevent people from diving in too deeply. This training session will show users where to get tools, how to install and run a number of these tools in a virtual environment and how to analyze the risks involved in running them. Training Objectives: Where to obtain specific industrial cyber security tools Installing and running cyber security tools in a safe, virtual environment Knowing how to expand the skills learned and to adopt these in production environments Notes to Attendees: Attendee laptops must be able to be unlocked so that virtual machines (VMware or equivalent) be loaded, hacking tools added. Corporate laptops may have restrictions in place. Level of Training: Beginner, Intermediate 1:00 PM - 3:00 PM Protecting ICS Applications Training with Palo Alto Networks (Attendees must bring their laptops for this training) Speaker: Kim Wall, Palo Alto Networks, Inc. Co Speaker: Sean Johnson, Palo Alto Networks, Inc. Room: 342 A Training Description: This hands-on lab will provide a virtual environment simulating IT and OT networks. Students will follow a step-by-step guide to configure a Palo Alto Networks firewall to protect the ICS environment from unauthorized polling. Each exercise will use very specific application identifiers for Modbus and Modbus sub-functions. This training is for anyone responsible for protecting the ICS network from outside or inside attacks. Training Abstract: The lab is self-paced and divided into the following sections: Activity 1 - Access and spin up the lab environment Activity 2 - Setting up the SCADA infrastructure (PLC workstation, Modbus master/slave) Activity 3 - Modbus visibility (observe modbus sub-functions traffic, observe modbus threat prevention events) Activity 4 - Modbus control enforcement (simulate sabotage, block sabotage) Activity 5 - Threat prevention on PLC write (configure vulnerability profile, attempt threat/plc write, verify results) Activity 6 - User-ID enforcement (configure authentication policy, enforce user-id into ICS network, run Modbus supervisory commands with and without user authentication) Training Objectives:
Understand the granularity of Modbus protocol visibility and control available within the Palo Alto Networks firewall platform. Understand the vulnerability and threat protection available to ICS applications within the Palo Alto Networks firewall platform. Learn how to reduce the attack surface of the ICS network by utilizing the application-id and user-id features within the Palo Alto Networks firewall platform. Level of Training: Beginner, Intermediate Copyright 2015 ENTELEC Community. All rights reserved.