CWSP: Certified Wireless Security Professional

CWSP: Certified Wireless Security Professional Course Description

Duration: 4.00 days (32 hours)

Using the latest enterprise wireless LAN security and auditing equipment in this hands-on course, learn, in detail, the most up-to-date WLAN intrusion and DoS tools and techniques. You will learn about functionality of the 802.11i amendment to the 802.11 standard, the inner-workings of each EAP type used with wireless LANs today, and every class and type of WLAN security solution available on the market from wireless intrusion prevention systems to wireless network management systems.

Next Class Dates

Contact us to customize this class with your own dates, times and location. You can also call 1-888-563-8266 or chat live with a Learning Consultant.

Back to Top

Intended Audience for this CWSP: Certified Wireless Security Professional Course

  • » Wireless professionals looking to gain cutting-edge wireless security expertise and earn the CWSP credential should attend.

Back to Top

CWSP: Certified Wireless Security Professional Course Objectives

  • » WLAN security technology and solutions
  • » WLAN security policy, concerns, and auditing practices
  • » Layer vulnerabilities and analysis
  • » WLAN mobile endpoint security solutions
  • » WPA/WPA2 Personal and Enterprise configurations
  • » WLAN management and monitoring
  • » IEEE 802.11 Authentication and Key Management (AKM)

Back to Top

CWSP: Certified Wireless Security Professional Course Outline

      1. Introduction to WLAN Security Technology
        1. Security policy
        2. Security concerns
        3. Security auditing practices
        4. Application layer vulnerabilities and analysis
        5. Data Link layer vulnerabilities and analysis
        6. Physical layer vulnerabilities and analysis
        7. 802.11 security mechanisms
        8. Wi-Fi Alliance security certifications
      2. Small Office/Home Office WLAN Security Technology and Solutions
        1. WLAN discovery equipment and utilities
        2. Legacy WLAN security methods, mechanisms, and exploits
        3. Appropriate SOHO security
      3. WLAN Mobile Endpoint Security Solutions
        1. Personal-class mobile endpoint security
        2. Enterprise-class mobile endpoint security
        3. User-accessible and restricted endpoint policies
        4. VPN technology overview
      4. Branch Office/Remote Office WLAN Security Technology and Solutions
        1. General vulnerabilities
        2. Preshared Key security with RSN cipher suites
        3. Passphrase vulnerabilities
        4. Passphrase entropy and hacking tools
        5. WPA/WPA2 Personal
        6. How it works
        7. Configuration
        8. Wi-Fi Protected Setup (WPS)
        9. Installation and configuration of WIPS, WNMS, and WLAN controllers to extend enterprise security policy to remote and branch offices
      5. Enterprise WLAN Management and Monitoring
        1. Device identification and tracking
        2. Rogue device mitigation
        3. WLAN forensics
        4. Enterprise WIPS installation and configuration
        5. Distributed protocol analysis
        6. WNMS security features
        7. WLAN controller security feature sets
      6. Enterprise WLAN Security Technology and Solutions
        1. Robust Security Networks (RSN)
        2. WPA/WPA2 Enterprise
        3. How it works
        4. Configuration
        5. IEEE 802.11 Authentication and Key Management (AKM)
        6. 802.11 cipher suites
        7. Authentication services (RADIUS, LDAP) in WLANs
        8. User profile management (RBAC)
        9. Public Key Infrastructures (PKIs) used with WLANs
        10. Certificate Authorities and x.509 digital certificates
        11. RADIUS installation and configuration
        12. 802.1X/EAP authentication mechanisms
        13. 802.1X/EAP types and differences
        14. 802.11 handshakes
        15. Fast BSS Transition (FT) technologies
      7. Lab: WLAN Controller Security
        1. Secure access to the WLAN controller using secure management protocols
        2. Configure multiple WLAN profiles, each with its own authentication and cipher suites including WPA/WPA2 Personal and Enterprise
        3. Configure the WLAN controller for RADIUS connectivity and authentication
        4. Client station connectivity to the controller, including DHCP and browsing
        5. Integrated rogue device discovery
      8. Lab: Wireless Intrusion Prevention Systems (WIPS)
        1. WIPS installation, licensing, add/configure sensors, and secure console connectivity
        2. Configuration according to organizational policy
        3. Properly classify authorized, unauthorized, and external/interfering access points
        4. Identify and mitigate rogue devices
        5. Identify specific attacks against the authorized WLAN infrastructure or client stations
      9. Lab: Using Laptop Analyzers
        1. Install and configure a WLAN discovery tool
        2. Install, license, and configure a laptop protocol analyzer
        3. Install, license, and configure a laptop spectrum analyzer
        4. Locate and analyze 2.4 GHz and 5 GHz WLANs with a WLAN discovery tool
        5. Locate and analyze 2.4 GHz and 5 GHz WLANs with a WLAN protocol analyzer
        6. Capture and analyze a WPA2 Personal authentication in a WLAN protocol analyzer
        7. Capture and analyze a WPA2 Enterprise authentication in a WLAN protocol analyzer
        8. Capture and analyze Hotspot authentication and data traffic in a WLAN protocol analyzer
        9. Capture and analyze beacons, probe requests, probe responses, and association requests with a WLAN protocol analyzer
        10. View a normal RF environment, a busy RF environment, and an RF attack on the WLAN in a spectrum analyzer
      10. Lab: Fast Secure Roaming
        1. Configure a WLAN infrastructure with two controllers and two APs per controller
        2. Configure APs for specific power and channel settings
        3. Install and configure a RADIUS server for PEAP
        4. Configure both controllers and an authorized client device for PEAP authentication using the CCMP cipher suite
        5. Configure an 802.11 protocol analyzer to capture the BSS transition
        6. Perform a slow BSS transition within a controller as a baseline
        7. Enable FSR mechanisms within controllers and the client station
        8. Perform a fast BSS transition within a controller as a comparison
        9. Perform a slow BSS transition between controllers as a baseline
        10. Perform a fast BSS transition (if vendor FSR mechanisms permit) between controllers as a comparison

Back to Top

This training prepares students for the following exam(s):

  • » PW0-200 : Certified Wireless Security Professional

Back to Top

Do you have the right background for CWSP: Certified Wireless Security Professional?

Skills Assessment

We ensure your success by asking all students to take a FREE Skill Assessment test. These short, instructor-written tests are an objective measure of your current skills that help us determine whether or not you will be able to meet your goals by attending this course at your current skill level. If we determine that you need additional preparation or training in order to gain the most value from this course, we will recommend cost-effective solutions that you can use to get ready for the course.

Our required skill-assessments ensure that:

  1. All students in the class are at a comparable skill level, so the class can run smoothly without beginners slowing down the class for everyone else.
  2. NetCom students enjoy one of the industry's highest success rates, and pass rates when a certification exam is involved.
  3. We stay committed to providing you real value. Again, your success is paramount; we will register you only if you have the skills to succeed.
This assessment is for your benefit and best taken without any preparation or reference materials, so your skills can be objectively measured.

Take your FREE Skill Assessment test »

Back to Top

Award winning, world-class Instructors

Richard L.
- Over 20 years experience in the IT industry.
- CEH and Microsoft training for many government agencies, including the United States Department of Homeland Security, and the Federal Bureau of Investigation.
- CEH and Microsoft training for Fortune corporations such as Merrill Lynch and ADP.

Bio:

Richard is a premier Microsoft Certified Trainer and Certified EC-Council Instructor. He has over 20 years of experience as a network administrator, security consultant, vulnerability assessor, and penetration tester for assorted Fortune companies.

Richard??s knowledge on the development and implementation of policies and procedures concerning the security of network data is unsurpassed. He has conducted successful CEH and Microsoft training classes for many government agencies including the United States Department of Homeland Security, the Department of Justice and the Federal Bureau of Investigation, as well as Fortune enterprises such as Merrill Lynch and ADP.

See more...   See more instructors...

Back to Top

Recent Client Testimonials & Reviews

The class met all our expectations! The material was perfect and very efficiently delivered by our instructor. He was able to adapt and give us scenarios as to how this course would benefit us in our environment. What made his delivery even more impressive was his vast experience teaching a highly diverse group like ours.

He did a great job and the staff at NetCom Information Technology coordinated very efficiently with us ensuring each step and area was taken care of. I am very impressed with the level of "follow-up" each staff provided. We will certainly use NetCom Information Technology for any future needs and recommend you to anyone that we find that may need this type training.


Course(s) Taken

» CWNA: Certified Wireless Network Administrator

Hi,

I just passed CWSP exam in your site yesterday. I would like to thank the instructor for giving me good direction and very useful material for me to pass this tough exam. I believe that NetCom has very good professional quality in business and lots of resources for enterprise. I feel lucky to have chosen NetCom for my professional training vendor then to have met the best teacher in wireless fields. This is why I passed CWSP with 95%! Thank you.

Regards,

J. Y.
J. Y.
Course(s) Taken

» CWNA and CWSP Combo - Boot Camp

What I liked most about NetCom was the instructor !
Francisco Pena
Course(s) Taken

» Wireless Networking Workshop (FREE)
» CWNA and CWSP Combo - Boot Camp

  More testimonials »  

Back to Top