Wireless and Mobile Network Security Architecture

About

COURSE OBJECTIVES:
• Gain in-depth knowledge on wireless and mobile network security and its relation to the new security-based protocols
• Apply proactive and defensive measures to counter potential threats, attacks and intrusions
• Design secured wireless and mobile networks that optimise accessibility whilst minimising vulnerability to security risks

Did you know that most wireless set-ups have insufficient security measures in place?
As wireless and mobile networks continue to gain momentum in popularity, many organisations with deployed wireless networks are inevitably more vulnerable to the unauthorised use of and access to their internal infrastructure.

As modern day attack methodologies get more sophisticated, including viruses, worms, network layer attacks and trojans, the need to redesign the perimeter of security architecture is greater than ever. The costs of failing to secure adequately from on-going threats can have dramatic financial and operating consequences.

Installing conventional security software and equipment just isn’t enough as wireless security is a complex issue. To safeguard and protect your network, on top of installing a firewall, virus protection, encryption and authentication  you’d need to design a detailed security architecture for both fixed and wireless/mobile networks. Also all the security technologies must be able to operate seamlessly across both fixed and wireless/mobile local and wide area networks.

Wireless and Mobile Network Security Architecture is a practical course that has been developed to provide you with a comprehensive understanding of the overall principles of wireless network security architecture, firewalls architecture, intrusion detection and prevention, security management...basically all the vulnerabilities your organisation is exposed to and can’t afford to overlook!

SEVEN GREAT REASONS TO ATTEND
1. The rapid growth of online operations are posing a range of security issues to organisations
2. Many Wi-Fi hotspots are not fully secured - which could lead to serious network infection
3. Security threats are projected to get worse as additional threats develop from p2p sharing software, spyware and ‘perimeter killer’ worms
4. Develop an in-depth understanding of the security requirements in the wireless and mobile environment
5. Explore and mitigate wireless & mobile security risks and threats that your organisation may be exposed to
6. Develop and apply proactive measures to counter potential attacks
7. Learn to audit and ensure that your wireless & mobile network security programme is effective

Outline

Day 1: Security Architectures - Protocols, Performance and Management

The Principles/Fundamentals of Wireless Networks
•  Background to security risks and the Internet
• Threats, attacks and Intrusions -TCP/IP vulnerabilities, spyware, zeroday attacks rootkits, phishing, botnets, buffers overflow, blended threats, spoofing
• Categories and classification of network threats and attacks
• Issues in web server security
• Identifying threats to TCP/IP application servicesPerimeter Security - Firewalls and Intrusion Prevention
• Establishing security zones in network architecture
• Stateful packet inspection and encrypted tunnelling
• Exploring new developments in firewall architecture
• Intrusion detection and prevention
• Optimising your active security tools - mappers, security scanners, system integrity checkers

Cryptography and Authentication in Wireless Networks
• Understanding security architecture and the difference between fixed and mobile networks
• Understanding and developing end-to-end security infrastructure
• Symmetric, asymmetric and public key crypto, hashing and digital signatures
• Secure tunnelling: IPSec, SSL/TLS, digital certificates
• Multiple factor authentication and authentication servers: RADIUS
• Optimising your security tokens - challenge/response and time-based systems, smart cards, biometrics

Security Management, Evaluation and Testing of Wireless Networks
• Getting familiar with the ISO17799 Information Security Management
• Security policy and structure
• Conducting risk and vulnerability assessment
• Meeting the requirements in government and commercial certification: CC, ETSI, 3GPP
• Exploring policy based network management systems (PBMS)

Virtual Private Networking (VPN)
• Understanding VPN security framework and technologies
• Understanding and developing VPN topology and protocols
• Understanding and developing application layer security protocols

Spam
• Identifying and utilising current and next generation spam filtering tools
• Spamming techniques: generation and reduction tools
• Spam classification and filtering engines: machine learning and non-machine learning
• Email security: S/MIME and PGP
Case study: heuristic, bayesian, combined filters

Day 2: Security Principles in Wireless and Mobile Networks

Broadband Wireless/WIMAX and Mobile Architectures
• Understanding underlying architecture and protocols
• Exploring the latest development in fixed and mobile broadband access
• The relativity of security, quality of service (QoS) and performance
• Managing wireless broadband networks

VoIP (Voice over IP) and IMS (IP Multimedia Systems)
• Understanding VoIP architecture and protocols
• Differential services traffic models
• Implementing real-time traffic engineering
• Security and performance issues of your current VoIP IMS
• Management of VoIP and IMS networks

Wireless LAN/802.11x Architecture
• Understanding underlying architecture and protocols
• Implementing security and 802.11i/WPA2
• Complying with Quality of Service (QoS) 802.11e
• Attack and protection tools in 802.11 networks
• Management of Wireless LAN networks

PANs (Personal Area Networks)
• Architecture, network categories and protocols used in PANs
• How bluetooth applications interwork with 802.11 networks
• Understanding bluetooth architecture and protocols
• Security, performance and attacking tools

3G Wireless WAN Architecture
• Understanding UMTS and CDMA2000 architecture and protocols
• Understanding mobile services, applications and security requirements
• Security infrastructure - UMTS security model, WAP2, WTLS, IPSec, etc
• New developments in high speed 3G networking: HSDPA/HSUPA, MIMO etc
• Quality of service and performance

Demonstration of Common Attacks to Wireless Networks
• Performing sniffing, eavesdropping and traffic analysis
• Spoofing connections to the access point
• How to crackencrypted traffic
• Identifying the various Attack tools, SMAC (SpoofMAC), airopeek, aerodump, ethereal, netstumbler, aircrack etc

Developing the Wireless and Mobile Network Infrastructure
• Integration of wireless and mobile networks - vertical and horizontal handoff
• Developing support for security and quality of service performance
Case study of wireless LAN design and analysis

Facilitator

In-house Training

Do you have a number of staff who would benefit from this course? Find out more about running Wireless and Mobile Network Security Architecture , in-house at your organisation or ask us about our team training discounts:

Contact the Training Team on 09 912 3616 or email training@brightstar.co.nz or fill in the form below.
Visit www.brightstar.co.nz/inhouse to learn more about our in-house training options & training packages.

Do you have a number of staff who would benefit from this course? Find out more about running Wireless and Mobile Network Security Architecture , in-house at your organisation or ask us about our team training discounts:

Contact the Training Team on 09 912 3616 or email training@brightstar.co.nz or fill in the form below.
Visit www.brightstar.co.nz/inhouse to learn more about our in-house training options & training packages.