| Wireless Network Security Workshop Asian Institute of Technology: intERLab | |
| Venue: | Internet Education and Research Laboratory (intERLab) Asian Institute of Technology (AIT) | 
| Location: | Bangkok, Thailand | 
| Dates: | June 9-12, 2008 (Mon-Thu) | 
| Instructors: | Joel Jaeggli: Nokia John Kemp: RouteViews, University of Oregon | 
| This workshop was organized by Internet Education and Research Laboratory (intERLab) and the Network Startup Resource Center (NSRC). Each session is 90 minutes in length. There is a daily lunch break between sessions 2 and 3. 
 | 
| MONDAY | TOPICS | GOALS | 
| Session 1 | Welcome and Introduction [Web ] Introduction to Wireless [Web | Lab ] | Introduce insructors and attendees introduce themselves. Discuss 
  Foundation Concepts of Wireless Radio: 
 | 
| Session 2 | Foundations of Networking | Review Of TCP/IP Foundations, and Use of Unix Tools 
 | 
| Session 3 | Wireless Standards | Review the 802.11 Standards, Including 802.11a/b/g,802.11n, and WiMAX | 
| Session 4 | Access Point Configuration | Configure the Ubiquiti Access Points, Configuration Settings, and Building a Point-to-Point Connection | 
| TUESDAY | TOPICS | GOALS | 
| Session 1 | Ubuntu, and BackTrack 
 | An Introduction To Ubuntu Linux, and the BackTrack Security Distribution 
 | 
| Session 2 | Wireless Network Design | Basic Network Design Concepts, and Wireless Network Design 
 | 
| Session 3 | Network Security And NAC | Description of Information Security, Network Security, and NAC 
 | 
| Session 4 | FreeBSD and M0n0Wall 
 | FreeBSD Unix, and the M0n0Wall Security Distribution 
 | 
| WEDNESDAY | TOPICS | GOALS | 
| Session 1 | 802.11 Security Protocols 
 | Protocols That Define the Wireless Security Standards: 
 
 | 
| Session 2 | Network Traffic Analysis | A survey of Unix Tools that useful for network traffic observation and analysis. 
 | 
| Session 3 | Wireless Tools 
 | A number of tools that are useful for analysing wireless traffic
	and wireless radio. 
 | 
| Session 4 | Network Attacks | Common computer attacks, as well as network based attacks that are
	particularly successful in exploiting wireless clients. 
 
 | 
| THURSDAY | TOPICS | GOALS | 
| Session 4 | Extending the Network 
 | |
| Session 4 | Extending the Network 
 | |
| Session 4 | nmap, NESSUS, and SNORT | A Quick Review of Vulnerability Scanning Concepts and
	Intrustion Detection.  Includes discussion of open source
	tools: nmap, NESSUS, SNORT 
 | 
| Session 4 | Summary and Conclusions | Common computer attacks, as well as network based attacks that are
	particularly successful in exploiting wireless clients. 
 
 |