For further information or to request a quotation, please contact the Professional Education Courses Unit on:
Enquiries Phone: 02 5114 5573
Enquiries Email: ProfEdCourses@adfa.edu.au
Wireless technologies are ubiquitous in modern systems yet pose unique challenges. This technical course looks at security issues of a broad range of wireless devices from wireless computers, mobile phones and operational technologies. The course takes an in-depth look at types of different protocols, technologies, contextual considerations as well as practical approaches to attack and defence.
Topics covered include:
This course assumes knowledge from Cyber Security Boot Camp. While this is a technical course, it is instructor led and designed so non-technical students can further understand how attacks are carried out and better comprehend defence techniques.
On completion of this course, participants should be able to:
Introduction to wireless technology, common attacks and 802.11
Day 1 of the course introduces students to networking basics such as protocols used, transport layers, proxies and reorientates students to the wireless environment. The day will feature common discovery techniques as well as attacks on common 802.11 infrastructure.
Wireless technologies and Security, Networking Basics, Fundamentals of Wireless.
Continuation of 802.11
Day 2 sees students continue to develop their understanding of 802.11 with a focus on attacking client devices, complex networks as well as basic defence techniques.
Client Side Attacks, Monitoring and Defences.
Introduction to software defined radio
Day 3 of the course will introduce students to software defined radio as well as areas relating to the field including DECT, mobile telecommunications and satellite communications.
SDR, Satcom, DECT, Mobile Telecommunications, POCSAG.
802.15.4, PANs and Bluetooth
Day 4 focuses on other bespoke networks, protocols and personal area networks including Bluetooth, NFC and 802.15.4. A “bull ring” of problem solving activities will be employed and instructor led for this activity.
PANs, Bluetooth, NFC, 802.15.4, Attack Surfaces, Zigbee Environment.
IOT and defences
Our final day will conclude with an exploration of IoT environments, as well as defensive practices from a development and operational standpoint.
IoT Research and Defences, IoT practical activities.
This course maps to the following NICE Framework KSAs (Knowledge, Skills & Abilities):
K0108: Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
K0177: Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
K0442: Knowledge of how converged technologies impact cyber operations (e.g., digital, telephony, wireless).
K0446: Knowledge of how modern wireless communications systems impact cyber operations.
K0520: Knowledge of principles and practices related to target development such as target knowledge, associations, communication systems, and infrastructure.
K0600: Knowledge of the structure, architecture, and design of modern wireless communications systems.
K0614: Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems.
S0256: Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioural relationships.
A0092: Ability to identify/describe target vulnerability.
The National Initiative for Cybersecurity Education (NICE) Cyber Security Workforce Framework developed by the National Institute of Standards and Technology (NIST) establishes a taxonomy and common lexicon that describes cyber security work and job roles.
To find out more about the NICE Framework, go to: https://niccs.us-cert.gov/workforce-development/cyber-security-workforce-framework
Courses will be held subject to sufficient registrations. UNSW Canberra reserves the right to cancel a course up to five working days prior to commencement of the course. If a course is cancelled, you will have the opportunity to transfer your registration or be issued a full refund. If registrant cancels within 10 days of course commencement, a 50% registration fee will apply. UNSW Canberra is a registered ACT provider under ESOS Act 2000-CRICOS provider Code 00098G.
UNSW Institute for Cyber Security is a unique, cutting-edge, interdisciplinary research and teaching centre, working to develop the next generation of cyber security experts and leaders.
The centre is based in Canberra at the Australian Defence Force Academy and provides professional, undergraduate and post graduate education in cyber security. Our air-gapped, state of the art cyber range offers a secure environment where we deliver a number of technical and highly specialised learning opportunities.
Our courses are designed to give the next generation of cyber security professionals the skill sets needed to thrive in the industry. We can also create bespoke professional education programs tailored to your organisation's needs.
Contact us at firstname.lastname@example.org to discuss how.