Section 1: Introduction
Logistics
Section 2: Wireless and RF Fundamentals
WiFi Fundamentals – Propagation, Interference, and Measurement
Wireless Technology & Nomenclature
WiFi / Wireless Benefits & Competing Standards
RF Propagation and Interference
Wireless Antennas
Antenna Theory, Types and Placement
Wireless Channel Restrictions
RF Mathematics & Power Measurements
Decibel Calculations – Calculating Gains and Losses
Hardware and Communication Architectures of Wireless Networks
Hardware
Access Points, Antennas & Selection Criteria
Service Sets
Basic Service Set (BSS)
Basic Service Set Identifier (BSSID)
Extended Basic Service Set (ESSID)
Device-to-Device (Adhoc) Communication
Recap – Analyzing the Wireless Network – Data Collection
Location – How Network Infrastructure Devices Affect Capture and Analysis
Wireless Data Collection – Tips & Techniques
Capture Configuration and Multiple Captures
Configurations – LAN vs. WiFi / WLAN IEEE 802.11
Real-time vs. Post Capture Analysis
Monitoring Traffic in Real-Time
Section 3: IEEE 802.11 Technologies – The Beginning: IEEE 802.11a / b / g
Frequency, Bandwidth & Channel Considerations
Spread Spectrum Technologies
Frequency Hopping Spread Spectrum (FHSS)
Direct Sequence Spread Spectrum (DSSS)
Orthogonal Frequency Division Multiplexing (OFDM)
Spatial Division Multiplexing (SDM)
Wireless MAC Layer
Finding a Service Set
Connecting to a Service Set
Authenticating & Associating to a Service Set
Moving Between Service Sets
Disconnection from Service Sets
Wireless Frame Addressing
Transmitter vs. Source Address
Receiver vs. Destination Address
Wireless Frame Forwarding
Wireless Data Transmission
Arbitration
Distributed Coordination Function (DCF)
Point Coordination Function (PCF)
Hybrid Coordination Function (HCF)
Inter-frame Spacing & RTS / CTS
Wireless Fragmentation & Acknowledgement
Wireless Network Statistical Assessment
Wireshark WiFi Supplemental Features
Wireless Expert Systems Analysis
Tracking & Reconstructing Wireless Data Flows
Section 4: IEEE 802.11 Technologies – The Transition: IEEE 802.11n
Overview & Terminology
IEEE 802.11n RF Propagation
Beam Forming & Multiple-in / Multiple-out (MIMO)
IEEE 802.11n Frame Format & New Fields
WiFi Quality of Service (QoS)
Frame Aggregation – MSDU vs. MPDU
Section 5: IEEE 802.11 Technologies – The Enhancements: IEEE 802.11ac / ad
Overview & Terminology
IEEE 802.11n Frame Format & New Fields
Section 6: Wireless Technologies: The Future – SoHo, and IoT
IEEE 802.15 Bluetooth
IEEE 802.16 WiMAX
Home RF
IEEE 802.15.4 ZigBee
Infrared
3G / 4G / 5G
Section 7: Wireless Site Survey and Optimization
Installation Considerations
Collocation & Throughput Considerations
Identifying Interference Sources
Types of Interference & Spectrum Analyzer Analysis
Integrating Wired & Wireless Networks
Maximizing Colocation & Throughput
Section 8: Wireless Security – Vulnerabilities, Threats and Analysis
Overview of WiFi-based Security Vulnerabilities
Rouge Device Detection and Analysis
Man-in-the-Middle Detection and Analysis
Malware / Ransomware Analysis
WiFi / Wireless-based Denial of Service (DoS / DDoS) Attack and Analysis
WiFi / Wireless-based Bots, Botnets and Analysis
Fixing the Security Problems in WiFi
Security Recommendations
IEEE 802.1x Radius Overview
Wireless Encryption and Decryption Techniques
Wired Equivalency Protocol (WEP)
WiFi Protected Access (WPA / WPA2 / WPA3)
Section 9: Summary and Recap – Effective Wireless Network Analysis Techniques
Where do we go from here?
Wireshark 0 – TCP/IP Networking Fundamentals Using Wireshark
Wireshark 1 – TCP/ IP Network Analysis
Wireshark 2 – Advanced Network and Security Analysis
Wireshark 3 – Network Forensics Analysis
Wireshark 4 – Mobile Device Forensics Analysis
Wireshark 5 – Cloud and Internet of Things (IoT) Advanced Network Analysis
Wireshark 6 – VoIP Advanced Network Analysis
Wireshark 7 – WiFi Advanced Network Analysis
Wireshark 8 – SCADA and ICS Advanced Network Analysis
Wireshark 9 – Wireshark Command Line Programs