8:00 AM – 5:00 PM

Wi Fi/WLAN Fundamentals Training by Tessco; Day Two of a Two Day Training. (Attendees must bring laptop computers for this training. Attendees should bring available Wi-Fi test instruments for performing signal analysis.)
Speaker: Dane Brockmille. Tessco
Room: 342 D

Training Description: This course will provide an overview of Wi-Fi standards and technologies and will give the student the ability to layout out and design a wireless network, configure wireless routers and wireless network adapters, add security to wireless networks, and to use the wireless network. An overview of Wi-Fi standards

Training Abstract:

You will Learn:

  • Wireless Network fundamentals
  • Wireless Network Architecture
  • Different Wireless Standards
  • How to deploy Wireless Hotspots and connect the WLAN to the WAN
  • How to Secure a Wireless Network
  • How to Measure Wireless Performance and Signal Strength
  • How to Configure computers to connect to a Wireless Network

Prerequisites: None, however a data fundamentals course is extremely helpful.

Course Content:

  1. Wired Network Review
  2. Wired Network Hardware
  3. Wired Network Protocols
  4. TCP/IP
  5. Ethernet
  6. Wireless Network Architecture
  7. Wireless Basics
  8. RF Communication
  9. Network Design
  10. Transporting Data
  11. Ethernet and IP packets
  12. 802.11 and Wi-Fi
  13. IEEE
  14. Wi-Fi Alliance
  15. Wireless LANs (Wi-Fi Standards)
  16. Radio Standards and Bands
  17. 802.11a
  18. 802.11b

iii. 802.11g

  • 802. 802.11n
  • 803. 802.11ac
  • 804. Security Standards
  • 805. WEP
  • 806. 802.11i-2003 (WPA)

iii. 802.11i-2004 (WPA2)

  1. 802.1x (RADIUS Authentication)
  2. Interference Control Standards (802.11h)
  3. 802.11h – Dynamic Frequency Selection (DFS)
  4. 802.11h – Transmit Power Control (TPC)
  5. Wireless Access Point Operating Modes
  6. Router/AP
  7. AP Only
  8. Repeater
  9. Mesh Node
  10. Bridge Mode
  11. Deploying Hotspots
  12. Wireless Networking Equipment
  13. Routers, Wired and Wireless
  14. Switches, Wired and Wireless
  15. Wireless Access Points
  16. Repeaters
  17. Mesh Nodes
  18. Power over Ethernet (PoE)
  19. Configuring Access Points
  20. Managed APs, Lightweight APs
  21. Local Connection Configuration
  22. Configuration via Wireless Connection
  23. Maintenance IP Address
  24. Endpoint Connection Methods
  25. Built-in Adapters
  26. Removable Adapters
  27. Single vs. Multiple Access points
  28. Basic Service Set (BSS) and Extended Service Set (ESS)
  29. SSID
  30. Allowable Characters
  31. Hidden or Broadcast

iii. SSID Naming Conventions

  1. Multiple SSIDs on the Same AP
  2. Channel Assignment
  3. Static
  4. Dynamic
  5. Signal interference
  6. Address Assignment
  7. IP Addresses: Same LAN or Isolated LAN
  8. MAC Addresses: BSSIDs

iii. Basic Radio MAC Address

  1. Virtualized MAC Addresses
  2. Other WLANs
  3. WISP
  4. WiMAX
  5. Internet Connectivity
  6. ISP requirements
  7. Wireless LAN Controller (WLC)
  8. Channel Management
  9. AP Groups
  10. Roaming and Handoffs
  11. Performance Measurement
  12. Distance Limitations
  13. Interference Issues
  14. Signal Strength and Throughput
  15. WLAN Throughput
  16. Testing Internet Connectivity
  17. Measuring Internet Throughput
  18. Measuring LAN Throughput
  19. Measuring Wireless Throughput
  20. Monitoring performance
  21. WLAN Security
  22. Threats to the WLAN
  23. Access Control
  24. Wireless VLAN
  25. Understanding Wireless Encryption
  26. Wired Equivalent Privacy (WEP)
  27. Wi-Fi Protected Access (WPA and WPA2)
  28. Pre-Shared Key (PSK) and Radius Authentication
  29. Client Isolation
  30. Steps to a Secure Wireless Network
  31. Configuring Network Computers
  32. Installing network adapters
  33. TCP/IP properties
  34. Network clients
  35. File and Printer sharing
  36. Domains and Workgroups
  37. Internet Connection (Hardware) Firewalls
  38. Software Firewalls
  39. Voice and Video over Wi-Fi
  40. Without Roaming
  41. With Roaming
  42. Equipment Interoperability Problems
  43. Mixing Vendors
  44. Mixing Protocols
  45. Hands-on Labs (done throughout the course)

Level of Training:

Who should Attend:

  • Wireless Networking Engineers
  • IT Staff
  • IT Managers
  • Wireless Network Support Personnel
  • Anyone interested in learning more about configuring and maintaining Wi-Fi networks

10:00 AM – 12:00 PM

Communication System Design Basics – From GIS to Network Buildout Training by End 2 End Technologies
Speaker: Cody Racette, End 2 End Technologies
Room: 342 A

Training Description: Discovering and discussing what information needs to be gathered about company assets before implementing field wireless communications systems. This training is or Telecommunications Engineers, Supervisors, Managers, Field personnel involved in planning & decision making.

This session will cover GIS data and various software tools, various RF propagation tools, as well as the necessary questions to ask your team before providing a solution.

Training Abstract: Slide show presentation with real software examples of GIS and RF propagation tools in action. Real world examples of stumbling blocks at each step of the design process. Point to Point, Point to multipoint, and Mesh radio systems will be discussed. Unlicensed as well as Licensed frequency bands will also be covered.

Training Objectives:

  • What Information gathering is required during the planning phase of a Field Network System
  • What software tools are available to analyze GIS data for your field and manipulate it into
    useful information for a network buildout.
  • What software tools are available to model field wireless networks to provide an
    implementation plan and realistic coverage/connectivity expectations when deploying your

Level of Training: Beginner, Intermediate

10:00 AM – 3:00 PM (12-1 break for lunch)

Resources and Tools for Cyber Security Testing Training by Berkana Resources (Attendees must bring their laptop computers for this training)
Instructor: Graham Speake, Berkana Resources
Room: 342 E

Training Description: This training session will look at and demonstrate useful tools that are readily available (often open source) to enable attendees to gain an understanding of cyber security techniques or allow more advanced users a roadmap to setting up a lab.

Training Abstract: There are many tools available that can enhance the knowledge of engineers who need or want experience in the area of industrial cyber security. While the tools available are often those used in the IT world, knowing how they can be applied to the industrial space and the associated risk factors can prevent people from diving in too deeply. This training session will show users where to get tools, how to install and run a number of these tools in a virtual environment and how to analyze the risks involved in running them.

Training Objectives:

  • Where to obtain specific industrial cyber security tools
  • Installing and running cyber security tools in a safe, virtual environment
  • Knowing how to expand the skills learned and to adopt these in production environments

Notes to Attendees: Attendee laptops must be able to be unlocked so that virtual machines (VMware
or equivalent) be loaded, hacking tools added. Corporate laptops may have restrictions in place.

Level of Training: Beginner, Intermediate

1:00 PM – 3:00 PM

Protecting ICS Applications Training with Palo Alto Networks (Attendees must bring their laptops for this training)
Speaker: Kim Wall, Palo Alto Networks, Inc.
Co Speaker: Lionel Jacobs Palo Alto Networks, Inc.
Room: 342 A

Training Description: This hands-on lab will provide a virtual environment simulating IT and OT networks. Students will follow a step-by-step guide to configure a Palo Alto Networks firewall to protect the ICS environment from unauthorized polling. Each exercise will use very specific application identifiers for Modbus and Modbus sub-functions. This training is for anyone responsible for protecting the ICS network from outside or inside attacks.

Training Abstract: The lab is self-paced and divided into the following sections:

  • Activity 1 – Access and spin up the lab environment
  • Activity 2 – Setting up the SCADA infrastructure (PLC workstation, Modbus master/slave)
  • Activity 3 – Modbus visibility (observe modbus sub-functions traffic, observe modbus threat
    prevention events)
  • Activity 4 – Modbus control enforcement (simulate sabotage, block sabotage)
  • Activity 5 – Threat prevention on PLC write (configure vulnerability profile, attempt threat/PLC write,
    verify results)
  • Activity 6 – User-ID enforcement (configure authentication policy, enforce user-ID into ICS network,
    run Modbus supervisory commands with and without user authentication)

Training Objectives:

  • Understand the granularity of Modbus protocol visibility and control available within the Palo
    Alto Networks firewall platform.
  • Understand the vulnerability and threat protection available to ICS applications within the
    Palo Alto Networks firewall platform.
  • Learn how to reduce the attack surface of the ICS network by utilizing the application-ID and
    user-ID features within the Palo Alto Networks firewall platform.

Level of Training: Beginner, Intermediate