Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Certified Wireless Security Professional (CWSP)

Learn to install and configure wireless networks for optimal security.

Using the latest enterprise wireless LAN security and auditing equipment in this hands-on course, learn, in detail, the most up-to-date WLAN intrusion and DoS tools and techniques. You will learn about functionality of the 802.11i amendment to the 802.11 standard, the inner-workings of each EAP type used with wireless LANs today, and every class and type of WLAN security solution available on the market from wireless intrusion prevention systems to wireless network management systems.

As an added bonus, you will receive a free exam voucher, study guide, and practice test to test your knowledge before taking the exam.

GK# 3604
Vendor Credits:
No matching courses available.
Start learning as soon as today! Click Add To Cart to continue shopping or Buy Now to check out immediately.
Access Period:
Scheduling a custom training event for your team is fast and easy! Click here to get started.
$
Your Selections:
Location:
Access Period:
No available dates

Who Should Attend?

Wireless professionals looking to gain cutting-edge wireless security expertise and earn the CWSP credential should attend.

What You'll Learn

  • WLAN security technology and solutions
  • WLAN security policy, concerns, and auditing practices
  • Layer vulnerabilities and analysis
  • WLAN mobile endpoint security solutions
  • WPA/WPA2 Personal and Enterprise configurations
  • WLAN management and monitoring
  • IEEE 802.11 Authentication and Key Management (AKM)

Course Outline

Module 1 – Security Fundamentals

  • Security Basics
  • CWNA Security Review
  • Industry Organizations
  • Terminology
  • Wireless Vulnerabilities

Module 2 – Wireless Security Challenges

  • Network Discovery
  • Pseudo-Security
  • Legacy Security Mechanisms
  • Network Attacks
  • Recommended Practices

Module 3 – Security Policy

  • Defining Security Policies
  • Policy Enforcement
  • Policy Management
  • Policy Types

Module 4 – Understanding Authentication

  • Passphrase Authentication
  • AAA
  • RBAC
  • RADIUS
  • 802.1X
  • EAP

Module 5 – Authentication and Key Management

  • Robust Security Networks (RSN)
  • RSN Information Element
  • RSN Authentication and Key Management (AKM)

Module 6 – Encryption

  • Encryption Fundamentals
  • Encryption Algorithms
  • WEP
  • TKIP
  • CCMP

Module 7 – Security Design Scenarios

  • Virtual Private Networks (VPN)
  • Remote Networking
  • Guest Access Networks

Module 8 – Secure Roaming

  • Roaming Basics and Terminology
  • Preauthentication
  • PMK Caching
  • Opportunistic Key Caching (OKC)
  • 802.11r FT
  • Proprietary Roaming
  • Voice Enterprise

Module 9 – Network Monitoring

  • Wireless Intrusion Prevention Systems (WIPS)
  • WIPS Deployment Models
  • WIPS Policy
  • Threat Mitigation
  • Location Services
  • WNMS
  • Protocol Analysis
  • Spectrum Analysis
BUY NOW

Prerequisites

Related Certifications