Certified Wireless Security Professional Training | CWSP Certification Training

Certified Wireless Security Professional Training | CWSP Certification Training

Course Delivery

This Course is available in the following format:

Request this course in a different delivery format

GSA Schedule 70 Saving for Government Customers

Course Overview:

Certified Wireless Security Professional Training | CWSP Certification Training – Hands-on

Using the latest enterprise wireless LAN security and auditing equipment. In this hands-on Certified Wireless Security Professional Training | CWSP Certification Training course, you will learn, in detail, the most up-to-date WLAN intrusion and DoS tools and techniques. With Certified Wireless Security Professional Training | CWSP Certification Training, you will also learn about functionality of the 802.11i amendment to the 802.11 standard, the inner-workings of each EAP type used with wireless LANs today, and every class and type of WLAN security solution available on the market, from wireless intrusion prevention systems to wireless network management systems.

Customize It:

● If you are familiar with some aspects of Certified Wireless Security Professional Training | CWSP Certification Training, we can omit or shorten their discussion.
● We can adjust the emphasis placed on the various topics or build the Certified Wireless Security Professional Training | CWSP Certification Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
● If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Certified Wireless Security Professional Training | CWSP Certification Training course in manner understandable to lay audiences.

Audience / Target Group:

The target audience for this Certified Wireless Security Professional Training | CWSP Certification Training course is defined here:

Wireless professionals looking to gain cutting-edge wireless security expertise and earn the CWSP credential

What You Will Learn

Upon completing this Certified Wireless Security Professional Training | CWSP Certification Training course, learners will be able to meet these objectives:

WLAN security technology and solutions
WLAN security policy, concerns, and auditing practices
Layer vulnerabilities and analysis
WLAN mobile endpoint security solutions
WPA/WPA2 Personal and Enterprise configurations
WLAN management and monitoring
IEEE 802.11 Authentication and Key Management (AKM)

Certified Wireless Security Professional Training | CWSP Certification Training – Course Syllabus:

Introduction to WLAN Security Technology

Security policy
Security concerns
Security auditing practices
Application layer vulnerabilities and analysis
Data Link layer vulnerabilities and analysis
Physical layer vulnerabilities and analysis
802.11 security mechanisms
Wi-Fi Alliance security certifications

Small Office/Home Office WLAN Security Technology and Solutions

WLAN discovery equipment and utilities
Legacy WLAN security methods, mechanisms, and exploits
Appropriate SOHO security

WLAN Mobile Endpoint Security Solutions

Personal-class mobile endpoint security
Enterprise-class mobile endpoint security
User-accessible and restricted endpoint policies
VPN technology overview

Branch Office/Remote Office WLAN Security Technology and Solutions

General vulnerabilities
Preshared Key security with RSN cipher suites
Passphrase vulnerabilities
Passphrase entropy and hacking tools
WPA/WPA2 Personal
How it works
Configuration
Wi-Fi Protected Setup (WPS)
Installation and configuration of WIPS, WNMS, and WLAN controllers to extend enterprise security policy to remote and branch offices

Enterprise WLAN Management and Monitoring

Device identification and tracking
Rogue device mitigation
WLAN forensics
Enterprise WIPS installation and configuration
Distributed protocol analysis
WNMS security features
WLAN controller security feature sets

Enterprise WLAN Security Technology and Solutions

Robust Security Networks (RSN)
WPA/WPA2 Enterprise
How it works
Configuration
IEEE 802.11 Authentication and Key Management (AKM)
802.11 cipher suites
Authentication services (RADIUS, LDAP) in WLANs
User profile management (RBAC)
Public Key Infrastructures (PKIs) used with WLANs
Certificate Authorities and x.509 digital certificates
RADIUS installation and configuration
802.1X/EAP authentication mechanisms
802.1X/EAP types and differences
802.11 handshakes
Fast BSS Transition (FT) technologies

Lab: WLAN Controller Security

Secure access to the WLAN controller using secure management protocols
Configure multiple WLAN profiles, each with its own authentication and cipher suites including WPA/WPA2 Personal and Enterprise
Configure the WLAN controller for RADIUS connectivity and authentication
Client station connectivity to the controller, including DHCP and browsing
Integrated rogue device discovery

Lab: Wireless Intrusion Prevention Systems (WIPS)

WIPS installation, licensing, add/configure sensors, and secure console connectivity
Configuration according to organizational policy
Properly classify authorized, unauthorized, and external/interfering access points
Identify and mitigate rogue devices
Identify specific attacks against the authorized WLAN infrastructure or client stations

Lab: Using Laptop Analyzers

Install and configure a WLAN discovery tool
Install, license, and configure a laptop protocol analyzer
Install, license, and configure a laptop spectrum analyzer
Locate and analyze 2.4 GHz and 5 GHz WLANs with a WLAN discovery tool
Locate and analyze 2.4 GHz and 5 GHz WLANs with a WLAN protocol analyzer
Capture and analyze a WPA2 Personal authentication in a WLAN protocol analyzer
Capture and analyze a WPA2 Enterprise authentication in a WLAN protocol analyzer
Capture and analyze Hotspot authentication and data traffic in a WLAN protocol analyzer
Capture and analyze beacons, probe requests, probe responses, and association requests with a WLAN protocol analyzer
View a normal RF environment, a busy RF environment, and an RF attack on the WLAN in a spectrum analyzer

Lab: Fast Secure Roaming

Configure a WLAN infrastructure with two controllers and two APs per controller
Configure APs for specific power and channel settings
Install and configure a RADIUS server for PEAP
Configure both controllers and an authorized client device for PEAP authentication using the CCMP cipher suite
Configure an 802.11 protocol analyzer to capture the BSS transition
Perform a slow BSS transition within a controller as a baseline
Enable FSR mechanisms within controllers and the client station
Perform a fast BSS transition within a controller as a comparison
Perform a slow BSS transition between controllers as a baseline
Perform a fast BSS transition (if vendor FSR mechanisms permit) between controllers as a comparison

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

Print Friendly, PDF & Email