802.11n, 802.11e, 802.11i, 802.11a, 802.11g, Wireless LAN Certified Training,  WLAN-CAN, WLAN-CSE, WLAN-CEP, WLAN-CAD, Wireless LAN Training, Wireless LAN Schulung

Wireless LAN Certified Training Program

(WLAN-CTP)

  • Typical wireless LAN scenarios, what do you have to secure?

  •  

  • How to secure your WLAN according to the OSI model?

  •  

  • Which WLAN security scenarios do you know?

  •  

  • What are the different types of WLAN MAC layer security solutions?

  •  

  • What are the common EAP types?

  •  

  • Why is EAP-MD5 unsecure?

  •  

  • Why is Cisco LEAP unsecure?

  •  

  • What is the difference between Cisco LEAP and Cisco LEAP – 802.11i?

  •  

  • Does an EAP-TLS authentication use mutual authentication based on the user name?

  •  

  • What are the additional security possibilities according to the Network layers?

  •  

  • What is the plaintext?

  •  

  • What is Ciphertext?

  •  

  • What are keys used for?

  •  

  • What is a Cipher?

  •  

  • What is a Brute Force attack?

  •  

  • What is an algorithmic attack?

  •  

  • What is a Queensland attack?

 

·     WLAN-CAD for administration                                                         ·         WLAN-CSE for security

 

 

802.11n, 802.11e, 802.11i, 802.11a, 802.11g, Wireless LAN Certified Training,  WLAN-CAN, WLAN-CSE, WLAN-CEP, WLAN-CAD, Wireless LAN Training, Wireless LAN Schulung

 

·     WLAN-CAN for analysis                                                                    ·         WLAN-CIN for integration

 

·         WLAN-CEP for experts

  • What do you use the Asleap tool for?

  •  

  • How does the coWPAtty work?

  •  

  • What is a RF Jamming attack used for?

  •  

  • Which two different classes of security algorithms does the 802.11i define?

  •  

  • Which algorithms do the Pre-RSNA consist of?

  •  

  • Which algorithms do the RSNA consist of?

  •  

  • Does Pre-RSNA equipment include RSNAIE?

  •  

  • How does a RSNA-capable STA establish a RSNA when using IEEE 802.1x authentication and Key Management in an ESS?

  •  

  • What is ICV standing for?

  •  

  • What is IV standing for?

  •  

  • Which process must be completed first association or authentication?

  •  

  • How many frames are used to complete an open system authentication?

 

·     WLAN-CAD for administration                                                         ·         WLAN-CSE for security

 

 

802.11n, 802.11e, 802.11i, 802.11a, 802.11g, Wireless LAN Certified Training,  WLAN-CAN, WLAN-CSE, WLAN-CEP, WLAN-CAD, Wireless LAN Training, Wireless LAN Schulung

 

·     WLAN-CAN for analysis                                                                    ·         WLAN-CIN for integration

 

·         WLAN-CEP for experts

  • How many frames are used to complete a Shared Key authentication?

  •  

  • Which are the two RSNA data confidentiality and integrity protocols?

  •  

  • What is TKIP standing for?

  •  

  • Which part of TKIP provides a defense against forgery attack?

  •  

  • What does protect TKIP against replay attack?

  •  

  • What is TSC standing for?

  •  

  • Which function is used to defeat weak-key attacks against the WEP Key?

  •  

  • Where is the MIC appended?

  •  

  • Where do you find the MIC if IEEE Std. 802.11 fragments a data frame?  

  •  

  • What is the size of the extension of the MPDU compared to the pre-RSNA WEP MPDU?

·     WLAN-CAD for administration                                                         ·         WLAN-CSE for security

 

 

802.11n, 802.11e, 802.11i, 802.11a, 802.11g, Wireless LAN Certified Training, WLAN-CAN, WLAN-CSE, WLAN-CEP, WLAN-CAD, Wireless LAN Schulung, Wireless LAN Training

 

·     WLAN-CAN for analysis                                                                    ·         WLAN-CIN for integration

 

·         WLAN-CEP for experts 

  • Does TKIP encrypt the extended IV or not?

  •  

  • Does TKIP encrypt all the MPDUs generated from one MSDU under the same temporal key?

  •  

  • Which attacks are difficult to succeed if you use the TKIP’s MIC?

  •  

  • How does TKIP block the successful MPDU-Level attacks?

  •  

  • Which fields are used to calculate the TKIP’MIC?

  •  

  • Can a MSDU-with-MIC be portioned into one or more MPDU?

  •  

  • How does TKIP make TKIP’MIC forgeries more difficult?

  •  

  • Why shouldn’t the authenticator log the deauthentication as a MIC failure event?

  •  

  • Which four inputs to CCM originator processing are needed?

  •  

  • In which frame type are the 802.1x frames transmitted?

  •  

  • Via which port are the 802.1x authentication frames passed, controlled or uncontrolled?

  •  

  • Whose responsibility is it to implement port blocking?

  •  

  • How does a STA discover the AP’s security policy?

  •  

·     WLAN-CAD for administration                                                         ·         WLAN-CSE for security

 

 

802.11n, 802.11e, 802.11i, 802.11a, 802.11g, Wireless LAN Certified Training, WLAN-CAN, WLAN-CSE, WLAN-CEP, WLAN-CAD, Wireless LAN Schulung, Wireless LAN Training

 

·     WLAN-CAN for analysis                                                                    ·         WLAN-CIN for integration

 

·         WLAN-CEP for experts

  • When is the PMK generated after authentication or before?

  •  

  • Which key is used by a supplicant to derive a PTK?

  •  

  • Who generates an ANonce?

  •  

  • Who generates a SNonce?

  •  

  • Who generates a GTK?

  •  

  • Who has to install the PTK, Supplicant or Authenticator?

  •  

  • Who has to install the PTK and GTK, Supplicant or Authenticator?  

  •  

  • Which handshake process is used to refresh the GTK if the Authenticator has to change the GTK?

  •  

  • What is the PMK when you choose WPA with preshared key as a security policy?

  •  

  • If a disassociation initiated by a STA what happens to the PTKSA and GTKSA at both ends?

  •  

  • If a disassociation initiated by a STA what happens to the controlled and uncontrolled port?

  •  

  • How many 4-way Handshakes are needed in an IBSS with N STA ?

  •  

  • What is the 4-way handshake used for?

  •  

  • In which frames a peer STA will find the information about the peer’s security policy and if RSNA is enabled?

  •  

  • What should a STA do if it doesn’t know the security policy of the peer?

  •  

  • Which functions does the Authenticator-to-AS protocol have to support, to provide security assurances?

·     WLAN-CAD for administration                                                         ·         WLAN-CSE for security

 

 

802.11n, 802.11e, 802.11i, 802.11a, 802.11g, Wireless LAN Certified Training, WLAN-CAN, WLAN-CSE, WLAN-CEP, WLAN-CAD, Wireless LAN Schulung, Wireless LAN Training

 

·     WLAN-CAN for analysis                                                                    ·         WLAN-CIN for integration

 

·         WLAN-CEP for experts

  • What is a security association?

  •  

  • How many types of security association does an RSNA STA support?

  •  

  • What is PMKSA standing for?

  •  

  • What is PTKSA standing for?

  •  

  • What is GTKSA standing for?

  •  

  • What is SMKSA standing for?

  •  

  • What is STKSA standing for?

  •  

  • Which component does create PMKSA, Supplicant’s SME, Authenticator’s SME or Authentication Server’s SME?

  •  

  • Which elements does the PMKSA consist of?

·     WLAN-CAD for administration                                                         ·         WLAN-CSE for security

 

 

802.11n, 802.11e, 802.11i, 802.11a, 802.11g, Wireless LAN Certified Training, WLAN-CAN, WLAN-CSE, WLAN-CEP, WLAN-CAD, Wireless LAN Schulung, Wireless LAN Training

 

·     WLAN-CAN for analysis                                                                    ·         WLAN-CIN for integration

 

·         WLAN-CEP for experts

 

e-mail: training@wlan-ctp.de

 

go up

www.wlan-ctp.de, www.wlan-ctp.eu, www.wlan-ctp.com, www.airdefense.de, www.cnti.de