Wireless

Certified Wireless Security Professional (CWSP) Technology Course

Steve Evans
Steve Evans
CWNE#177, BCNP

This course is included in our All Access Pass! Get unlimited streaming access to 12,000+ videos, workbooks, and practice exams by starting your free 7-day trial of the All Access Pass subscription!
Start Your FREE Trial!


Course Description
Module 1 - WLAN Security Basics: This module discusses the need for Wi-Fi security and provides the background of decision and standards making bodies. It also discusses 802.11 in the Enterprise. Module 2 - Wifi Attack Vectors: This module discusses typical modes of attack on Wi-fi implementations. It also underlines the fact that different attack methods expose the vulnerability of the Wi-Fi network. Module 3 - 802.11 Security Design Considerations: This module describes the need for performing a risk assessment as well as establishing a security policy. It also discusses management and monitoring of the enterprise Wi-fi network. Module 4 - 802.11 Authentication: This module details the different 802.11 authentication methods used from password based to enterprise based. It provides details on the complexities of more stringent authentication methods.
  • Course
    • WLAN Security Basics
      • Terminology
      • 802.11 and the OSI Model
      • The need for Wi-Fi security
      • 802.11 Standards & Regulation Bodies
      • 802.11 in the Enterprise
    • WLAN attack vectors
      • Physical Considerations
      • Passive Eavesdropping
      • Active Attacks
      • Social Engineering
      • Thwarting Attacks
    • WLAN Security Design
      • Risk Assessment & Security Policy
      • Mobile Device Management (MDM)
      • Network Partitioning
    • WLAN Authentication
      • Client Centric Authentication
      • Enterprise Authentication
      • PEAP
      • EAP-FAST
      • EAP-TLS
    • WLAN Encryption
      • WEP and its Weaknesses
      • WPAv1 and its Weaknesses
      • WPAv2/AES
      • WPA2 and KRACK vulnerability
    • WLAN Intrusion Detection and Prevention
      • Security Baselining
      • Threat Identification and Classification
      • Logging and Reporting
      • Wireless Intrusion Detection Systems and Prevention
    • Mobile Device Security
      • Terminology
      • Mobility
      • Voice Client Constraints
      • Fast Transition
    • WLAN Security Analysis in Practice
      • EAP-FAST Analysis (real-time)
      • EAP-TLS Analysis (real time)
      • Rogue Discovery (real time)
Course Outline:
  • Course
    • WLAN Security Basics
      • Terminology
      • 802.11 and the OSI Model
      • The need for Wi-Fi security
      • 802.11 Standards & Regulation Bodies
      • 802.11 in the Enterprise
    • WLAN attack vectors
      • Physical Considerations
      • Passive Eavesdropping
      • Active Attacks
      • Social Engineering
      • Thwarting Attacks
    • WLAN Security Design
      • Risk Assessment & Security Policy
      • Mobile Device Management (MDM)
      • Network Partitioning
    • WLAN Authentication
      • Client Centric Authentication
      • Enterprise Authentication
      • PEAP
      • EAP-FAST
      • EAP-TLS
    • WLAN Encryption
      • WEP and its Weaknesses
      • WPAv1 and its Weaknesses
      • WPAv2/AES
      • WPA2 and KRACK vulnerability
    • WLAN Intrusion Detection and Prevention
      • Security Baselining
      • Threat Identification and Classification
      • Logging and Reporting
      • Wireless Intrusion Detection Systems and Prevention
    • Mobile Device Security
      • Terminology
      • Mobility
      • Voice Client Constraints
      • Fast Transition
    • WLAN Security Analysis in Practice
      • EAP-FAST Analysis (real-time)
      • EAP-TLS Analysis (real time)
      • Rogue Discovery (real time)

If you would like more information on how to purchase this course individually, contact a Training Specialist.