Wireless

Certified Wireless Security Professional (CWSP) Technology Course

Steve Evans
Steve Evans
CWNE#177, BCNP

Course Description
Module 1 - WLAN Security Basics: This module discusses the need for Wi-Fi security and provides the background of decision and standards making bodies. It also discusses 802.11 in the Enterprise. Module 2 - Wifi Attack Vectors: This module discusses typical modes of attack on Wi-fi implementations. It also underlines the fact that different attack methods expose the vulnerability of the Wi-Fi network. Module 3 - 802.11 Security Design Considerations: This module describes the need for performing a risk assessment as well as establishing a security policy. It also discusses management and monitoring of the enterprise Wi-fi network. Module 4 - 802.11 Authentication: This module details the different 802.11 authentication methods used from password based to enterprise based. It provides details on the complexities of more stringent authentication methods.
  • Course
    • WLAN Security Basics
      • Terminology
      • 802.11 and the OSI Model
      • The need for Wi-Fi security
      • 802.11 Standards & Regulation Bodies
      • 802.11 in the Enterprise
    • WLAN attack vectors
      • Physical Considerations
      • Passive Eavesdropping
      • Active Attacks
      • Social Engineering
      • Thwarting Attacks
    • WLAN Security Design
      • Risk Assessment & Security Policy
      • Mobile Device Management (MDM)
      • Network Partitioning
    • WLAN Authentication
      • Client Centric Authentication
      • Enterprise Authentication
      • PEAP
      • EAP-FAST
      • EAP-TLS
    • WLAN Encryption
      • WEP and its Weaknesses
      • WPAv1 and its Weaknesses
      • WPAv2/AES
      • WPA2 and KRACK vulnerability
    • WLAN Intrusion Detection and Prevention
      • Security Baselining
      • Threat Identification and Classification
      • Logging and Reporting
      • Wireless Intrusion Detection Systems and Prevention
    • Mobile Device Security
      • Terminology
      • Mobility
      • Voice Client Constraints
      • Fast Transition
    • WLAN Security Analysis in Practice
      • EAP-FAST Analysis (real-time)
      • EAP-TLS Analysis (real time)
      • Rogue Discovery (real time)
Course Outline:
  • Course
    • WLAN Security Basics
      • Terminology
      • 802.11 and the OSI Model
      • The need for Wi-Fi security
      • 802.11 Standards & Regulation Bodies
      • 802.11 in the Enterprise
    • WLAN attack vectors
      • Physical Considerations
      • Passive Eavesdropping
      • Active Attacks
      • Social Engineering
      • Thwarting Attacks
    • WLAN Security Design
      • Risk Assessment & Security Policy
      • Mobile Device Management (MDM)
      • Network Partitioning
    • WLAN Authentication
      • Client Centric Authentication
      • Enterprise Authentication
      • PEAP
      • EAP-FAST
      • EAP-TLS
    • WLAN Encryption
      • WEP and its Weaknesses
      • WPAv1 and its Weaknesses
      • WPAv2/AES
      • WPA2 and KRACK vulnerability
    • WLAN Intrusion Detection and Prevention
      • Security Baselining
      • Threat Identification and Classification
      • Logging and Reporting
      • Wireless Intrusion Detection Systems and Prevention
    • Mobile Device Security
      • Terminology
      • Mobility
      • Voice Client Constraints
      • Fast Transition
    • WLAN Security Analysis in Practice
      • EAP-FAST Analysis (real-time)
      • EAP-TLS Analysis (real time)
      • Rogue Discovery (real time)

Course Format Options:

Online Streaming

Train anywhere with our web, iOS, Android and Apple TV apps! You'll also have access to any course updates and additions.

Video Download

Download the entire course in mobile, high and HD(1080p) resolutions.

  • Regular price $39.99
  • Save


02hr 43min
April 9, 2018