CPSC 6555: Guide to Wireless Network Security

Special Topic course Offered in Summer 2009

Description: This course examines the fundamental security issues, problems and solutions of wireless LANs.  This course includes a broad coverage of wireless LAN vulnerabilities, wireless attacks, wireless security models, design and management of secure wireless networks and wireless security policies.  The main focus of this course is to teach students how to defend a wireless network against various possible attacks through hands-on activities. Another focus is to give students an exposure to current research on wireless security.

** This course will help students and professionals prepare for Certified Wireless Security Professional (CWSP) Examination as all CWSP objectives will be covered in this course. **

 

Prerequisite: Student must have a good knowledge of networking. Knowledge of basic network security is a plus.

Textbooks:

·         Required:   CWSP Guide to Wireless Security by Mark Ciampa

                            Publisher: Thomson Course Technology

                            ISBN-13: 978-1-4188-3637-5, ISBN-10: 1-4188-3637-0

 

·         Reference:  WI-FOO The Secrets of Wireless Hacking    by    A. Vladimirov, K. Gavrilenko,  A. Mikhailovsky

   

               Publisher: Addison-Wesley

               ISBN – 13: 978-0-321-20217-8, ISBN-10: 0-321-20217-1

Other Materials:

·         Windows XP Professional or Home Edition. Students who do not have Windows XP can create a virtual machine and install Windows XP (available to CSU students for free) in the virtual machine.  Students may also remotely use computers in our Security Lab via VPN.

·         Good Internet connection and Web browser (required)

·         Wireless router (preferable)

 

Course Objectives:

·         Students will have an understanding of wireless LAN security issues– vulnerabilities, attacks and current solution models.

·         Students will learn how to design and manage a secure wireless network.

·         Students will learn how to defend an attack on a wireless network by using existing hardware and software.

·         Students will be able to use various networking, security and forensic tools.

Tentative Instructional Methods: (Subject to Change)

·         Course materials and assignments will be delivered via web CT.

·         There will be hands-on assignments and research assignments.