Wednesday, May 16, 2018

Similar documents
Tuesday, May :00 AM - 5:00 PM

Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP)

Secure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements

Configuring a VAP on the WAP351, WAP131, and WAP371

Wireless Attacks and Countermeasures

Cisco Troubleshooting Cisco Wireless Enterprise Networks WITSHOOT v1.1

Chapter 7. Basic Wireless Concepts and Configuration. Part I

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Wireless technology Principles of Security

1.0 Basic RF Characteristics (15%) 1.1 Describe RF signal characteristics Frequency Amplitude Phase 1.1.

CWTS Exam Objectives (Exam PW0-070)

What is Eavedropping?

Wireless Router at Home

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS

Wireless Technologies

Wireless LAN Administration 3.0

Grandstream Networks, Inc. GWN76xx Wi-Fi Access Points Master/Slave Architecture Guide

Basic Wireless Settings on the CVR100W VPN Router

Wireless# Guide to Wireless Communications. Objectives

TLEN5560 Wireless Systems Lab Semester: Spring 2016

Certified Wireless Network Administrator

IE156: ICS410: ICS/SCADA Security Essentials

Prepare Your Network for BYOD. Meraki Webinar Series

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Chapter 10: Wireless LAN & VLANs

Wireless Networks. Lecture 4: Wireless Networking Devices. Assistant Teacher Samraa Adnan Al-Asadi 1

Ruckus ZoneDirector 1106 WLAN Controller (up to 6 ZoneFlex Access Points)

This course provides students with the knowledge and skills to successfully survey, install, and administer enterprise Wi-Fi networks.

Mobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE

Ruckus ZoneDirector 3450 WLAN Controller (up to 500 ZoneFlex Access Points)

Wireless LAN, WLAN Security, and VPN

Outdoor High Power b/g/n Wireless USB Adapter USER MANUAL 4.0

802.11b+g Wireless LAN USB Adapter. User Manual

WAP9112/9114 Quick Start Guide

Standard For IIUM Wireless Networking

"Charting the Course... Implementing Cisco Unified Wireless Networking Essentials v2.0 (IUWNE) Course Summary

What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne

MTA_98-366_Vindicator930

Internetwork Expert s CCNP Bootcamp. Wireless LANs. WLANs replace Physical (layer 1) and Data Link (layer 2) transports with wireless

Securing Wireless Networks by By Joe Klemencic Mon. Apr

WL-5420AP. User s Guide


Wireless AC1750 Wave 2 Dual-Band PoE Access Point

Wireless LAN Solutions

Wireless LAN Overview

ITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!

COPYRIGHTED MATERIAL. Contents

54,23 USD gross 44,09 USD net

Chapter 4 Advanced Settings and Features

Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ]

COPYRIGHTED MATERIAL. Index

Waterloo School District Wireless Network Infrastructure Project Additional Information

Your wireless network

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps

IP network that supports DHCP or manual assignment of IP address, gateway, and subnet mask

Access Connections 5.1 for Windows Vista: User Guide

Chapter 5 Local Area Networks. Computer Concepts 2013

Wireless (Select Models Only) User Guide

User Manual DIR-850L. Wireless AC1200 Dual Band Gigabit Router.

Cisco Deploying Basic Wireless LANs

Learn How to Configure EnGenius Wi-Fi Products for Popular Applications

Cisco WAP121 Wireless-N Access Point with Single Point Setup

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode

Security SSID Selection: Broadcast SSID:

Chapter 11: Networks

Information Technology Policy Board Members. SUBJECT: Update to County WAN/LAN Wireless Standards

Wireless MAXg Technology

Release Notes for Avaya WLAN 9100 AOS-Lite Operating System WAP9112 Release WAP9114 Release 8.1.0

CCIE Wireless v3 Lab Video Series 1 Table of Contents

Simple, full featured and budgetary deployment of single AP or distributed APs Hot-Spot for small scale projects.

Procedure: You can find the problem sheet on the Desktop of the lab PCs.

802.11ac 3x3 Dual Band High-Powered Wireless Access Point/Client Bridge

Configuring Layer2 Security

several of the 2.4 GHz radios where disabled

User Guide Outdoor Point to Point CPE

802.3at ac 3x3 Dual Band Ceiling Mount Access Point/WDS. Datasheet. can be used with EAP1750H. Key Features. capable switches or injectors

Naveen Kumar. 1 Wi-Fi Technology

FAQ on Cisco Aironet Wireless Security

Wireless Network Security

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode

802.3at ac 3x3 Dual Band Ceiling Mount Access Point/WDS. can be used with EAP1750H. Key Features

CUA-854 Wireless-G Long Range USB Adapter with Antenna. User s Guide

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

EnGenius Quick Start Guide

HP0-Y33: IMPLEMENTING HP WIRELESS NETWORKS

Assignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson

Cisco Unified Wireless Network Solution Overview

User Manual of 5.8G Outdoor CPE

TopGlobal MB8000 Hotspots Solution

Introduction to Juniper Networks Wireless LANs (IJWL)

Table of Contents 1 WLAN Service Configuration 1-1

QuickSpecs. HPE OfficeConnect M n Access Point Series. Overview. HPE OfficeConnect M n Access Point Series

WUG2690 User s Manual

XG-520 Wireless b/g Portable Router. User s Manual

Course Outline. CWTS Certified Wireless Technology Specialist. CWTS Certified Wireless Technology Specialist

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Configuring Basic Wireless Settings on the RV130W

Transcription:

Wednesday, May 16, 2018 8:00 AM - 5:00 PM Wi Fi/WLAN Fundamentals Training by Tessco; Day Two of a Two Day Training. (Attendees must bring laptop computers for this training. Attendees should bring available Wi-Fi test instruments for performing signal analysis.) Speaker: Dane Brockmille. Tessco Room: 342 D Training Description: This course will provide an overview of Wi-Fi standards and technologies and will give the student the ability to layout out and design a wireless network, configure wireless routers and wireless network adapters, add security to wireless networks, and to use the wireless network. An overview of Wi-Fi standards Training Abstract: You will Learn: _ Wireless Network fundamentals _ Wireless Network Architecture _ Different Wireless Standards _ How to deploy Wireless Hotspots and connect the WLAN to the WAN _ How to Secure a Wireless Network _ How to Measure Wireless Performance and Signal Strength _ How to Configure computers to connect to a Wireless Network Prerequisites: None, however a data fundamentals course is extremely helpful. Course Content: 1. Wired Network Review 2. Wired Network Hardware 3. Wired Network Protocols 4. TCP/IP 5. Ethernet 6. Wireless Network Architecture 7. Wireless Basics 8. RF Communication 9. Network Design 10. Transporting Data 11. Ethernet and IP packets 12. 802.11 and Wi-Fi 13. IEEE 14. Wi-Fi Alliance 15. Wireless LANs (Wi-Fi Standards) 16. Radio Standards and Bands

17. 802.11a 18. 802.11b iii. 802.11g 802. 802.11n 803. 802.11ac 804. Security Standards 805. WEP 806. 802.11i-2003 (WPA) iii. 802.11i-2004 (WPA2) 1. 802.1x (RADIUS Authentication) 2. Interference Control Standards (802.11h) 3. 802.11h - Dynamic Frequency Selection (DFS) 4. 802.11h - Transmit Power Control (TPC) 5. Wireless Access Point Operating Modes 6. Router/AP 7. AP Only 8. Repeater 9. Mesh Node 10. Bridge Mode 11. Deploying Hotspots 12. Wireless Networking Equipment 13. Routers, Wired and Wireless 14. Switches, Wired and Wireless 15. Wireless Access Points 16. Repeaters 17. Mesh Nodes 18. Power over Ethernet (PoE) 19. Configuring Access Points 20. Managed APs, Lightweight APs 21. Local Connection Configuration 22. Configuration via Wireless Connection 23. Maintenance IP Address 24. Endpoint Connection Methods 25. Built-in Adapters 26. Removable Adapters 27. Single vs. Multiple Access points 28. Basic Service Set (BSS) and Extended Service Set (ESS) 29. SSID 30. Allowable Characters 31. Hidden or Broadcast iii. SSID Naming Conventions 1. Multiple SSIDs on the Same AP 2. Channel Assignment 3. Static 4. Dynamic 5. Signal interference

6. Address Assignment 7. IP Addresses: Same LAN or Isolated LAN 8. MAC Addresses: BSSIDs iii. Basic Radio MAC Address 1. Virtualized MAC Addresses 2. Other WLANs 3. WISP 4. WiMAX 5. Internet Connectivity 6. ISP requirements 7. Wireless LAN Controller (WLC) 8. Channel Management 9. AP Groups 10. Roaming and Handoffs 11. Performance Measurement 12. Distance Limitations 13. Interference Issues 14. Signal Strength and Throughput 15. WLAN Throughput 16. Testing Internet Connectivity 17. Measuring Internet Throughput 18. Measuring LAN Throughput 19. Measuring Wireless Throughput 20. Monitoring performance 21. WLAN Security 22. Threats to the WLAN 23. Access Control 24. Wireless VLAN 25. Understanding Wireless Encryption 26. Wired Equivalent Privacy (WEP) 27. Wi-Fi Protected Access (WPA and WPA2) 28. Pre-Shared Key (PSK) and Radius Authentication 29. Client Isolation 30. Steps to a Secure Wireless Network 31. Configuring Network Computers 32. Installing network adapters 33. TCP/IP properties 34. Network clients 35. File and Printer sharing 36. Domains and Workgroups 37. Internet Connection (Hardware) Firewalls 38. Software Firewalls 39. Voice and Video over Wi-Fi 40. Without Roaming 41. With Roaming 42. Equipment Interoperability Problems 43. Mixing Vendors 44. Mixing Protocols 45. Hands-on Labs (done throughout the course) Level of Training:

Who should Attend: Wireless Networking Engineers IT Staff IT Managers Wireless Network Support Personnel Anyone interested in learning more about configuring and maintaining Wi-Fi networks 10:00 AM - 12:00 PM Communication System Design Basics - From GIS to Network Buildout Training by End 2 End Technologies Speaker: Cody Racette, End 2 End Technologies Room: 342 A Training Description: Discovering and discussing what information needs to be gathered about company assets before implementing field wireless communications systems.this training is or Telecommunications Engineers, Supervisors, Managers, Field personnel involved in planning & decision making. This session will cover GIS data and various software tools, various RF propagation tools, as well as the necessary questions to ask your team before providing a solution. Training Abstract: Slide show presentation with real software examples of GIS and RF propagation tools in action. Real world examples of stumbling blocks at each step of the design process. Point to Point, Point to multipoint, and Mesh radio systems will be discussed. Unlicensed as well as Licensed frequency bands will also be covered. Training Objectives: What Information gathering is required during the planning phase of a Field Network System Design. What software tools are available to analyze GIS data for your field and manipulate it into useful information for a network buildout. What software tools are available to model field wireless networks to provide an implementation plan and realistic coverage/connectivity expectations when deploying your network. Level of Training: Beginner, Intermediate 10:00 AM - 3:00 PM (12-1 break for lunch) Resources and Tools for Cyber Security Testing Training by Berkana Resources (Attendees must bring their laptop computers for this training) Instructor: Graham Speake, Berkana Resources Room: 342 E

Training Description: This training session will look at and demonstrate useful tools that are readily available (often open source) to enable attendees to gain an understanding of cyber security techniques or allow more advanced users a roadmap to setting up a lab. Training Abstract: There are many tools available that can enhance the knowledge of engineers who need or want experience in the area of industrial cyber security. While the tools available are often those used in the IT world, knowing how they can be applied to the industrial space and the associated risk factors can prevent people from diving in too deeply. This training session will show users where to get tools, how to install and run a number of these tools in a virtual environment and how to analyze the risks involved in running them. Training Objectives: Where to obtain specific industrial cyber security tools Installing and running cyber security tools in a safe, virtual environment Knowing how to expand the skills learned and to adopt these in production environments Notes to Attendees: Attendee laptops must be able to be unlocked so that virtual machines (VMware or equivalent) be loaded, hacking tools added. Corporate laptops may have restrictions in place. Level of Training: Beginner, Intermediate 1:00 PM - 3:00 PM Protecting ICS Applications Training with Palo Alto Networks (Attendees must bring their laptops for this training) Speaker: Kim Wall, Palo Alto Networks, Inc. Co Speaker: Sean Johnson, Palo Alto Networks, Inc. Room: 342 A Training Description: This hands-on lab will provide a virtual environment simulating IT and OT networks. Students will follow a step-by-step guide to configure a Palo Alto Networks firewall to protect the ICS environment from unauthorized polling. Each exercise will use very specific application identifiers for Modbus and Modbus sub-functions. This training is for anyone responsible for protecting the ICS network from outside or inside attacks. Training Abstract: The lab is self-paced and divided into the following sections: Activity 1 - Access and spin up the lab environment Activity 2 - Setting up the SCADA infrastructure (PLC workstation, Modbus master/slave) Activity 3 - Modbus visibility (observe modbus sub-functions traffic, observe modbus threat prevention events) Activity 4 - Modbus control enforcement (simulate sabotage, block sabotage) Activity 5 - Threat prevention on PLC write (configure vulnerability profile, attempt threat/plc write, verify results) Activity 6 - User-ID enforcement (configure authentication policy, enforce user-id into ICS network, run Modbus supervisory commands with and without user authentication) Training Objectives:

Understand the granularity of Modbus protocol visibility and control available within the Palo Alto Networks firewall platform. Understand the vulnerability and threat protection available to ICS applications within the Palo Alto Networks firewall platform. Learn how to reduce the attack surface of the ICS network by utilizing the application-id and user-id features within the Palo Alto Networks firewall platform. Level of Training: Beginner, Intermediate Copyright 2015 ENTELEC Community. All rights reserved.