Search
IUPUI School of Engineering and Technology

IUPUI School of Engineering and Technology

Wireless Security

CIT 46000 / 3 Cr.

Focuses on the risks and benefits associated with wireless local area network communications as well as how the networking industry defines a secure wireless network. In addition, students gain the skills needed to properly create, configure and maintain a secure wireless network.

Software

Provided

Outcomes

Course Outcomes (What are these?)

  • Recognize the foundational principles of wireless LANs (CIT j)
  • Identify the role a secure wireless LAN plays in overall network security (CIT j)
  • Describe the importance of understanding frequency allocation and interference as it pertains to wireless security (CIT j)
  • Discuss standards associated with wireless security (CIT m)
  • Identify ways to defend a wireless network from internal and external threats (CIT c, j)
  • Create and document a secure wireless network (CIT c, d, f)
  • Examine multiple methodologies for wireless network security (CIT j)

CIT Student Outcomes (What are these?)

(c) An ability to design, implement, and evaluate a computer-based system, process, component, or program to meet desired needs.

(d) An ability to function effectively on teams to accomplish a common goal.

(f) An ability to communicate effectively with a range of audiences.

(j) An ability to use and apply current technical concepts and practices in the core information technologies.

(m) An understanding of best practices and standards and their application.

Topics
  • LAN wireless technologies and fundamentals
  • Industry and commercial use of wireless LAN technologies
  • IEEE 802.11 and 802.11x standards
  • How wireless LAN attacks occur and finding vulnerabilities
  • 802.1x/EAP solutions, Kerberos and RADIUS authentication
  • PPTP, L2TP, and IPSec implemented in wireless LANs
  • 802.11i & Wi-Fi Protected Access (WPA)
  • Encryption
  • Security Policies
Principles of Undergraduate Learning (PULs)

1a. Communicate effectively in a variety of formats, particularly written, oral, and visual formats.

3. Integration and Application of Knowledge

4. Intellectual Depth, Breadth, and Adaptiveness

5. Understanding Society and Culture

What You Will Learn

LAN wireless technologies and fundamentals

  • List the advantages and disadvantages of a wireless local area network
  • Describe the functions of the wireless LAN standards and regulatory agencies
  • List wireless networking and security certifications
  • Define information security and tell why it is important in wireless networks
  • List the five types of IEEE WLANs

Industry and commercial use of wireless LAN technologies

  • Explain the main IEEE 802.11 security protections
  • Describe the vulnerabilities of IEEE 802.11 authentication
  • Tell how address filtering is limited
  • List the vulnerabilities of WEP

IEEE 802.11 and 802.11x standards

  • Describe how IEEE 802.11a networks function and how they differ from 802.11 networks
  • Outline how 802.11g enhances 802.11b networks
  • Discuss new and future standards and how they improve 802.11 networks
  • Explain how the use of wireless bridges and wireless switches expands the functionality and management of WLANs
  • List basic and expanded security features and issues of IEEE 802.11 networks

How wireless LAN attacks occur and finding vulnerabilities

  • Explain how security information can be gathered by social engineering, phishing, and other techniques
  • Define wardriving
  • List the hardware and software used for wardriving
  • Explain how a packet sniffer can be used in a WLAN
  • Describe the basic vulnerabilities of a WLAN
  • Tell how malware and spyware can infect wireless networks
  • List the vulnerabilities involved with implementing unsecured wireless LANs
  • Explain the different types of wireless infrastructure attacks

802.1x/EAP solutions, Kerberos and RADIUS authentication

  • Define wireless authentication
  • List and describe the different types of authentication servers
  • Explain the differences between various extended authentication protocols
  • Describe IEEE 802.1i authentication and key management
  • Describe the basic principles of security design
  • Define network segmentation and tell how it can be used for WLANs
  • List ways in which wireless hardware can be located securely
  • Describe the steps that can be taken to protect wireless devices
  • Explain how documents to be transmitted wirelessly can be encrypted
  • List and describe the secure management interfaces for encryption
  • Tell the features of a virtual private network and how they are used to secure wireless transmissions

PPTP, L2TP, and IPSec implemented in wireless LANs

  • Explain how documents to be transmitted wirelessly can be encrypted
  • List and describe the secure management interfaces for encryption
  • Tell the features of a virtual private network and how they are used to secure wireless transmissions

802.11i & Wi-Fi Protected Access (WPA)

  • Define wireless authentication
  • List and describe the different types of authentication servers
  • Explain the differences between various extended authentication protocols
  • Describe IEEE 802.1i authentication and key management
  • Explain the advantages of WPA and WPA2
  • Explain the technologies that are part of the personal security model
  • List the features of the transitional security model
  • Define the enterprise security model

Encryption

  • Explain how documents to be transmitted wirelessly can be encrypted
  • List and describe the secure management interfaces for encryption
  • Tell the features of a virtual private network and how they are used to secure wireless transmissions

Security Policies

  • Define security policy
  • List the elements of the security policy cycle
  • Describe several types of wireless security policies