TT460, Wireless Technology (WT)
Who Should Attend:
DCIO/Federal Computer Crime Investigators.
Prerequisites:
TT110 (INCH) or Test out
Duration:
5 Days
Course Description:
Students examine wireless technologies from both a technical, and investigative perspective.
Students learn basic wireless communication concepts that help them understand the capabilities
and limitations of various wireless technologies. Common wireless network configurations are
also examined. A number of hands-on exercises reinforce lecture material while providing students
with first-hand knowledge of wireless vulnerabilities and monitoring techniques. {Mobile}
Objectives:
- Recognize common wireless technologies
- Understand basic radio concepts
- Explain how Spread Spectrum Technology works
- Discuss common wireless network applications
- Define HomeRF, IrDA, Bluetooth, and Wi-Fi
- Recognize common wireless hardware components
- Identify how wireless devices communicate
- Build a wireless network
- Assemble a War Driving laptop or PDA
- Monitor a wireless network
- Discuss rogue wireless device detection methods
- Discuss Jamming, WEP Key Cracking, Denial of Service, Session Hijacking, and Man-in-the-Middle attacks
- Harden a wireless network
- Summarize the DoD 8100.2 Directive
Topics Covered
Wireless Technologies
- Wireless Technologies Overview
- Basic Radio Concepts
- Spread Spectrum
Wireless Networks
- What is a Wireless Network?
- Types of Wireless Networks
- Hardware Components
- How Wireless Devices Communicate
- Building a Wireless Network
Wireless Vulnerabilities
- Wardriving
- Eavesdropping
- Accidental Association
- Rogue Access Points
- Attacks
Wireless Network Security
- Device Configuration
- Rogue Detection
What Every Investigator Needs to Know
- Identifying Wireless Devices
- Locating Wireless Network Devices
- Evidence
- Common Configurations