This curriculum spans the technical and procedural rigor of a multi-workshop security architecture program, addressing wireless security with the same depth as an internal enterprise capability build for network infrastructure governance.
Module 1: Wireless Network Architecture and Threat Landscape
- Selecting between centralized, distributed, and cloud-managed wireless architectures based on organizational scale and control requirements.
- Mapping wireless access points to VLANs and subnets to limit broadcast domains and enforce segmentation.
- Assessing the risk of rogue access points introduced via employee-owned devices or unauthorized IT deployments.
- Implementing wireless site surveys to identify coverage gaps, interference sources, and physical security exposure.
- Deciding whether to deploy dual 2.4 GHz and 5 GHz SSIDs based on client device profiles and application demands.
- Integrating wireless network topology diagrams into existing network documentation standards for audit compliance.
Module 2: Authentication and Access Control Mechanisms
- Choosing between WPA2-Enterprise and WPA3-Enterprise based on client OS support and cryptographic requirements.
- Configuring RADIUS servers with certificate-based EAP-TLS authentication for high-security environments.
- Enforcing device compliance checks through integration with NAC systems prior to wireless network admission.
- Managing certificate lifecycle for wireless clients and authenticators in large-scale deployments.
- Implementing role-based access control (RBAC) policies that dynamically assign VLANs based on user identity.
- Handling fallback authentication methods during directory service outages without compromising security.
Module 3: Encryption Protocols and Key Management
- Deploying AES-CCMP encryption across all access points and disabling legacy TKIP support.
- Configuring pairwise master key (PMK) caching to balance roaming performance and reauthentication security.
- Managing group key rotation intervals to prevent long-term exposure while minimizing client disruption.
- Implementing Opportunistic Wireless Encryption (OWE) for open public networks without authentication.
- Validating that management frame protection (MFP) is enabled to prevent deauthentication attacks.
- Replacing pre-shared keys (PSKs) in enterprise settings with 802.1X even for small device fleets.
Module 4: Wireless Intrusion Detection and Prevention
- Deploying dedicated wireless IDS/IPS sensors with overlapping coverage for continuous monitoring.
- Configuring detection thresholds for MAC spoofing, spoofed beacons, and disassociation flood attacks.
- Responding to ad hoc network detections by triggering automated containment or alerts.
- Integrating wireless threat logs with SIEM platforms using standardized formats like WIPS-XML.
- Distinguishing between authorized and malicious access points using fingerprinting techniques.
- Managing false positives from personal hotspots and IoT devices through policy exceptions.
Module 5: Guest and BYOD Network Strategies
- Isolating guest traffic using separate SSIDs, VLANs, and firewall rules to prevent lateral movement.
- Implementing captive portals with time-limited access and logging for audit trail compliance.
- Enforcing device profiling to detect and restrict unauthorized device types on BYOD networks.
- Integrating guest access workflows with helpdesk systems for automated provisioning and revocation.
- Applying data loss prevention (DLP) policies to wireless guest traffic at the gateway level.
- Blocking peer-to-peer communication between guest clients to prevent client-side attacks.
Module 6: Regulatory Compliance and Audit Readiness
- Documenting wireless security configurations to meet PCI DSS requirements for cardholder data environments.
- Conducting periodic wireless penetration tests and retaining evidence for SOX or HIPAA audits.
- Configuring logging of all authentication attempts with sufficient retention for forensic analysis.
- Mapping wireless access controls to data classification policies for GDPR or CCPA compliance.
- Generating wireless configuration baselines and change management records for internal audits.
- Enabling FIPS 140-2 validated cryptographic modules on wireless infrastructure in government environments.
Module 7: Incident Response and Forensic Investigation
- Preserving wireless packet captures during active attacks for post-incident analysis.
- Correlating wireless association logs with endpoint and directory service logs to trace attacker movement.
- Disabling compromised SSIDs or channels without disrupting legitimate network operations.
- Using RF spectrum analyzers to detect jamming or hidden wireless bridges during investigations.
- Reconstructing user session timelines using AP handoff records and DHCP logs.
- Coordinating wireless containment actions with physical security teams to locate rogue devices.
Module 8: Ongoing Operations and Lifecycle Management
- Scheduling firmware updates for access points during maintenance windows to minimize downtime.
- Replacing end-of-life wireless hardware that no longer supports current encryption standards.
- Conducting quarterly reviews of wireless access policies to align with evolving business needs.
- Monitoring RF channel utilization and adjusting channel plans to reduce congestion and interference.
- Archiving and securely storing wireless configuration backups with version control.
- Enforcing MAC address filtering only as a supplemental control due to spoofing vulnerabilities.