logo


your one source for IT & AV

Training Presentation Systems Services & Consulting Cloud Services Purchase Client Center Computer Museum
Arrow Course Schedule | Classroom Rentals | Student Information | Free Seminars | Client Feedback | Partners | Survey | Standby Discounts

Certified Wireless Security Professional (CWSP)

SS Course: GK3604

Course Overview

TOP

Using the latest enterprise wireless LAN security and auditing equipment in this hands-on course, learn, in detail, the most up-to-date WLAN intrusion and DoS tools and techniques. You will learn about functionality of the 802.11i amendment to the 802.11 standard, the inner-workings of each EAP type used with wireless LANs today, and every class and type of WLAN security solution available on the market from wireless intrusion prevention systems to wireless network management systems.

As an added bonus, you will receive a free exam voucher and practice test to test your knowledge before taking the exam.

                                                                  

Scheduled Classes

TOP

Outline

TOP

Module 1 Security Fundamentals

  • Security Basics
  • CWNA Security Review
  • Industry Organizations
  • Terminology
  • Wireless Vulnerabilities

Module 2 Wireless Security Challenges

  • Network Discovery
  • Pseudo-Security
  • Legacy Security Mechanisms
  • Network Attacks
  • Recommended Practices

Module 3 Security Policy

  • Defining Security Policies
  • Policy Enforcement
  • Policy Management
  • Policy Types

Module 4 Understanding Authentication

  • Passphrase Authentication
  • AAA
  • RBAC
  • RADIUS
  • 802.1X
  • EAP

Module 5 Authentication and Key Management

  • Robust Security Networks (RSN)
  • RSN Information Element
  • RSN Authentication and Key Management (AKM)

Module 6 Encryption

  • Encryption Fundamentals
  • Encryption Algorithms
  • WEP
  • TKIP
  • CCMP

Module 7 Security Design Scenarios

  • Virtual Private Networks (VPN)
  • Remote Networking
  • Guest Access Networks

Module 8 Secure Roaming

  • Roaming Basics and Terminology
  • Preauthentication
  • PMK Caching
  • Opportunistic Key Caching (OKC)
  • 802.11r FT
  • Proprietary Roaming
  • Voice Enterprise

Module 9 Network Monitoring

  • Wireless Intrusion Prevention Systems (WIPS)
  • WIPS Deployment Models
  • WIPS Policy
  • Threat Mitigation
  • Location Services
  • WNMS
  • Protocol Analysis
  • Spectrum Analysis

    Prerequisites

    TOP

      Who Should Attend

      TOP

      Wireless professionals looking to gain cutting-edge wireless security expertise and earn the CWSP credential should attend.