Cyber Security Training Catalog- Certified Wireless Security Professional (CWSP)

$150.00Add to cart

Overview: This series covers the functions and features of Certified Wireless Security Professional. Students will learn the basics of WLAN security, Legacy security, encryption ciphers and methods, 802.11 authentication methods. They will then learn about dynamic encryption key generation, SOHO 802.11 security, fast secure roaming, wireless security risks, and wireless LAN security auditing. They will also learn how to implement wireless security monitoring, VPNs, remote access and guest access services, the WLAN security infrastructure, and WLAN security infrastructure. The CWSP certification is a professional level wireless LAN certification for the CWNP Program. The CWSP certification will advance your career by ensuring you have the skills to successfully secure enterprise Wi-Fi networks from hackers, no matter which brand of Wi-Fi gear your organization deploys. To earn a CWSP certification, you must hold a current and valid CWNA credential.

Course Modules:

Module 01 – WLAN Security Overview

(Duration: 1h 12m)

  1. Workbook (Pdf)
  2. WLAN Security Overview
  3. Where We Came From
  4. Standards Organizations
  5. ISO and the OSI
  6. ISOC Hierarchy
  7. Wi-Fi Alliance Standards
  8. 802.11 Networking Basics
  9. Connection Types
  10. 802.11 Security Basics
  11. Data Privacy
  12. AAA
  13. Segmentation
  14. Monitoring
  15. Policy
  16. Security History
  17. 802.11i and WPA
  18. RSN (Robust Security Network)
  19. Future of 802.11 Security
  20. Demo – Networking Basics
  21. Demo – Web GUI Introduction
  22. Demo – Security Options
  23. Module 01 Review
  24. Review Quiz (Number of attempts allowed: Unlimited)

Module 03 – Encryption Ciphers and Methods

(Duration: 1h 12m)

  1. Workbook (Pdf)
  2. Encryption Ciphers and Methods
  3. Encryption Basics
  4. Stream and Block Ciphers
  5. WLAN Encryption Methods
  6. WEP Again
  7. TKIP
  8. MIC
  9. TKIP MPDU
  10. CCMP
  11. WPA/WPA2
  12. Proprietary Solutions
  13. Demo
  14. – Encryption Example
  15. Module 03 Review
  16. Review Quiz (Number of attempts allowed: Unlimited)

Module 05- Dynamic Encryption Key Generation

(Duration: 1h )

  1. Workbook (Pdf)
  2. Dynamic Encryption Key Generation
  3. Dynamic WEP
  4. RSN
  5. Management Frames & RSNIE (eNotes)
  6. RSN (Cont.)
  7. Authentication and Key Management (AKM)
  8. RSNA Key Hierarchy
  9. Master Session Key (MSK) 4-Way Handshake
  10. Steps of the 4
  11. -way Handshake
  12. Group Key Handshake
  13. PeerKey Handshake
  14. Demo
  15. – EAP
  16. Demo
  17. – Information Elements
  18. Module 05 Review
  19. Review Quiz (Number of attempts allowed: Unlimited)

Module 07- Fast Secure Roaming

(Duration: 1h 52m)

  1. Workbook (Pdf)
  2. Fast Secure Roaming
  3. History of 802.11 Roaming
  4. Client Roaming Thresholds
  5. AP to AP Handoff (e
  6. -notes)
  7. Re
  8. -Association
  9. Types of APs
  10. RSNA Review
  11. PMKSA
  12. PMK Caching
  13. Pre
  14. -authentication
  15. Opportunistic Key Caching (OKC)
  16. Proprietary FSR
  17. FT Key Hierarchy (e
  18. -notes)
  19. FT Initial Mobility Domain Association
  20. Over the Air Fast BSS Transition (e
  21. -notes)
  22. Over the Air DS Fast BSS Transition (e-
    notes)
  23. 802.11K
  24. -2008
  25. Voice Personal and Voice Enterprise
  26. L3 Roaming
  27. Mobile IP
  28. Troubleshooting
  29. Module 07 Review
  30. Review Quiz (Number of attempts allowed: Unlimited)

Module 9 – Wireless LAN Security Auditing

(Duration: 28m)

  1. Workbook (Pdf)
  2. Wireless LAN Security Auditing
  3. Purpose of Auditing
  4. WLAN Audits
  5. Layer 1 Audit
  6. Layer 2 Audit
  7. Penetration Testing
  8. Wired Infrastructure Audit
  9. Social Engineering
  10. WIPS Audit
  11. Documenting the Audit
  12. Recommendations
  13. WLAN Security Auditing Tools
  14. Module 09 Review
  15. Review Quiz (Number of attempts allowed: Unlimited)

Module 11 – VPNs, Remote Access and Guest Access Services

(Duration: 37m)

  1. Workbook (Pdf)
  2. VPNs, Remote Access and Guest Access Services
  3. VPN Review
  4. Remote Access
  5. Module 11 Review
  6. Review Quiz (Number of attempts allowed: Unlimited)

Module 13 – Wireless Security Policies

(Duration: 32m)

  1. Workbook (Pdf)
  2. Wireless Security Policies
  3. General Policy
  4. Policy Creation
  5. Policy Management
  6. Functional Policy
  7. Password Policy
  8. Other Policies
  9. Government and Industry Regulations
  10. Module 13 Review
  11. Course Closure
  12. Review Quiz (Number of attempts allowed: Unlimited)

Module 02 – Legacy Security

(Duration: 1h 10m)

  1. Workbook (Pdf)
  2. Legacy Security
  3. Authentication
  4. Open System Authentication
  5. WEP Encryption
  6. Shared Key Authentication
  7. More About WEP
  8. Attacks Against WEP
  9. VPNs
  10. VPN Tunneling Protocols
  11. MAC Filters
  12. SSID Segmentation
  13. SSID Cloaking
  14. Demo
  15. – Security Associations
  16. Demo
  17. – MAC Spoofing
  18. Module 02 Review
  19. Review Quiz (Number of attempts allowed: Unlimited)

Module 04 – 802.11 Authentication Methods

(Duration: 1h 18m)

  1. Workbook (Pdf)
  2. 802.11 Authentication Methods
  3. WLAN Authentication Overview
  4. AAA
  5. Authentication
  6. Authorization
  7. Accounting
  8. 802.1X
  9. Supplicant Credentials
  10. Authentication Server Credentials
  11. EAP
  12. EAP Process
  13. Legacy EAP
  14. Strong EAP Protocols
  15. PACs
  16. Demo
  17. – Certificate Authority Server Credentials
  18. Module 04 Review
  19. Review Quiz (Number of attempts allowed: Unlimited)

Module 06 – SOHO 802.11 Security

(Duration: 57m)

  1. Workbook (Pdf)
  2. SOHO 802.11 Security
  3. Introduction
  4. Why a Passphrase 4-Way Handshake Again
  5. Risks of WPA/WPA2
  6. Another Risk Factor of WPA/
  7. Wi-Fi Protected Setup (WPS)
  8. Initial WLAN Setup
  9. SOHO Best Practices
  10. Demo
  11. – Cracking Hashes
  12. Module 06 Review
  13. Review Quiz (Number of attempts allowed: Unlimited)

Module 08 -Wireless Security Risks

(Duration: 54m)

  1. Workbook (Pdf)
  2. Wireless Security Risks
  3. Introduction
  4. Rogue Devices
  5. Rogue Prevention
  6. Eavesdropping
  7. Authentication Attacks
  8. DoS
  9. L2 DoS
  10. 802.11w
  11. MAC Spoofing
  12. Wireless Hijacking
  13. Peer
  14. -to
  15. -Peer Attacks
  16. Management Interface Exploits
  17. Physical Damage and Theft
  18. Social Engineering
  19. Public Access and WLAN Hotspots
  20. Demo
  21. – Rogue Devices
  22. Demo
  23. – Public Hotspots
  24. Module 08 Review
  25. Review Quiz (Number of attempts allowed: Unlimited)

Module 10 – Wireless Security Monitoring

(Duration: 39m)

  1. Workbook (Pdf)
  2. Wireless Security Monitoring
  3. WIDS/WIPS
  4. Sensor Placement
  5. Example of Rogue Detection (e
  6. -notes)
  7. Device Tracking
  8. Signature Analysis
  9. Behavioral Analysis
  10. Other Types of Monitoring
  11. More on Monitoring
  12. Module 10 Review Review Quiz (Number of attempts allowed: Unlimited

Module 12 – WLAN Security Infrastructure

(Duration: 1h 17m)

  1. Workbook (Pdf)
  2. WLAN Security Infrastructure
  3. WLAN Architecture
  4. Lightweight or Controller Based APs (e-notes)
  5. Other Controller Based Definitions
  6. Device Management
  7. Management Protocols
  8. Controller Communications
  9. Authorization Servers
  10. Deployment Architectures
  11. Other RADIUS Solutions
  12. RBAC
  13. Other Security Systems
  14. Module 12 Review
  15. Review Quiz (Number of attempts allowed: Unlimited)

Training Final Exam ?

Are you ready to earn your certificate of completion?

Launch The Exam

This course includes
  • about 13.11 hours on-demand video
  • 13 downloadable Pdf Workbooks
  • Unlimited time access (During Membership)
  • Access on mobile and Desktop
  • Certificate of Completion

$150.00Add to cart

Course Features Include:

  • Expert Lectures
    Learn on-demand from top instructors who are industry subject matter experts. Our highly certified expert instructors possess a superior understanding of the subject matter in their fields and have the ability to convey this knowledge in an effective, engaging, and professional manner to a wide audience.

  • Certificates of Completion
    Upon completion of a series of courses you can earn a certificate of completion from Career Academy. Certificates of Completion will display your full name, course completed, as well as the date of completion. Students have the ability to print this out or save it digitally to showcase your accomplishment.

  • PowerPoint Visuals:
    Many of the in-depth theories and processes discussed in our courses can be learned most efficiently through the detailed PowerPoint slides presented. These visuals are accompanied by an instructor voice-over to provide our students with a clear, efficient, and complete presentation of concepts.

  • Professional Development Activities
    Students are provided access to professional development activity files which allow for an individual to test out course theories and apply the knowledge they earned from the course.

  • Review Quizzes
    Once a course is completed, test your knowledge by taking our course review quiz! Students have the ability to retake any review quizzes as many times as they wish to ensure they understand the material or to improve upon their scores.

  • Mobile Access
    With our universal course player, you can learn from your computer, tablet as well as mobile devices. Keep up with your training on the go!

Trusted by Aspiring IT Professionals, Corporations and
Government agencies
for more than a Decade

Get unlimited online access learn anywhere, anytime using your computer or mobile device!