CWNP/Certified Wireless Security Professional (CWSP)/CWSP-205

Certified Wireless Security Professional (CWSP) Certification Training Course Overview

This course explains various discovery techniques of WLAN along with the intrusion and attack techniques. Students will be trained to analyze the 802.11 protocols, implement the Wireless Intrusion Prevention Systems (WIPS) and why layer 2 and 3 are opted over 802.11 networks. The course also illustrates the network security design models such as Enterprise, SMB, SOHO and Public.

This course prepares you for Exam CWSP-205.

Certified Wireless Security Professional (CWSP) (40 Hours) Download Course Contents

Live Online Training
Group Training 2250
20 - 24 Dec 09:00 AM - 05:00 PM CST
(8 Hours/Day)
1-on-1 Training (GTR) 2600
4 Hours
8 Hours
Week Days
Weekend

Start Time : At any time

12 AM
12 PM

GTR=Guaranteed to Run
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Buy Flexi For Only $99 (Online Training Re-imagined)

Customers who bought this course also bought

Course Modules

Module 1: Wireless Network Attacks and Threat Assessment – 20%
  • Describe general network attacks common to wired and wireless networks, including DoS, phishing, protocol weaknesses and configuration error exploits
  • Recognize common attacks and describe their impact on WLANs, including PHY and MAC DoS, hijacking, unauthorized protocol analysis and eavesdropping, social eng
  • Execute the preventative measures required for common vulnerabilities on wireless infrastructure devices, including weak/default passwords on wireless infrastructure equipment and misconfiguration of wireless infrastructure devices by administrative staff
  • Describe and perform risk analysis and risk mitigation procedures, including asset management, risk ratings, loss expectancy calculations and risk management planning.
  • Explain and demonstrate the security vulnerabilities associated with public access or other unsecured wireless networks, including the use of a WLAN for spam transmission, malware injection, information theft, peer-to-peer attacks and Internet attacks.
Module 2: Security Policy – 5%
  • Explain the purpose and goals of security policies including password policies, acceptable use policies, WLAN access policies, personal device policies, device management (APs, infrastructure devices and clients) and security awareness training for users
  • Summarize the security policy criteria related to wireless public access network use including user risks related to unsecured access and provider liability.
  • Describe how devices and technology used from outside an organization can impact the security of the corporate network including topics like BYOD, social networking and general MDM practices
Module 3: Wireless LAN Security Design and Architecture – 50%
  • Describe how wireless network security solutions may vary for different wireless network implementations including small businesses, home offices, large enterprises, public networks and remote access.
  • Understand and explain 802.11 Authentication and Key Management (AKM) components and processes including encryption keys, handshakes and pre-shared key management.
  • Define and differentiate among the 802.11-defined secure networks, including pre-RSNA security, Transition Security Networks (TSN) and Robust Security Networks (RSN) and explain the relationship of these networks to terms including RSNA, WPA and WPA2.
  • Identify the purpose and characteristics of IEEE 802.1X and EAP and the processes used including EAP types (PEAP, EAP-TLS, EAP-TTLS, EAP-FAST and EAP-SIM), AAA servers (RADIUS) and certificate management.
  • Recognize and understand the common uses of VPNs in wireless networks, including remote APs, VPN client access, WLAN controllers and cloud architectures.
  • Describe centrally-managed client-side security applications, including VPN client software and policies, personal firewall software, mobile device management (MDM) and wireless client utility software.
  • Describe and demonstrate the use of secure infrastructure management protocols, including HTTPS, SNMP, secure FTP protocols, SCP and SSH.
  • Explain the role, importance, and limiting factors of VLANs and network segmentation in an 802.11 WLAN infrastructure.
  • Understand additional security features in WLAN infrastructure and access devices, including management frame protection, Role-Based Access Control (RBAC), Fast BSS transition (preauthentication and OKC), physical security methods and Network Access Contr
  • Explain the purpose, methodology, features, and configuration of guest access networks and BYOD support, including segmentation, guest management, captive portal authentication and device management.
Module 4: Monitoring, Management, and Tracking – 25%
  • Explain the importance of ongoing WLAN monitoring and the necessary tools and processes used as well as the importance of WLAN security audits and compliance reports
  • Understand how to use protocol and spectrum analyzers to effectively evaluate secure wireless networks including 802.1X authentication troubleshooting, location of rogue security devices and identification of non-compliant devices.
  • Understand the common features and components of a Wireless Intrusion Prevention Systems (WIPS) and how they are used in relation to performance, protocol, spectrum and security analysis.
  • Describe the different types of WLAN management systems and their features, including network discovery, configuration management, firmware management, audit management, policy enforcement, rogue detection, network monitoring, user monitoring, event alarm
  • Describe and implement compliance monitoring, enforcement, and reporting. Topics include industry requirements, such as PCI-DSS and HIPAA, and general government regulations.
Download Course Contents

Request More Information

Course Prerequisites

Valid CWNA

On course completion, participants will be able to learn: 
 
  • Explore the discovery techniques for  WLAN
  • Explore the techniques of intrusion and attack
  • Perform analysis of 802.11 Protocol
  • Implementing Wireless WIPS
  • Explore network security design models such as Enterprise/SMB/SOHO/Public
  • Understand the managed endpoint security systems and 802.11 Authentication and Key
 

FAQ's


Yes, fee excludes local taxes.