Enterprise Wi-Fi Security (CWSP)

4 Day | Instructor Led

Using the latest enterprise wireless LAN security and auditing equipment in this hands-on course, you will learn, in detail, the most up-to-date WLAN intrusion and DoS tools and techniques. You will learn about functionality of the 802.11i amendment to the 802.11 standard, the inner-workings of each EAP type used with wireless LANs today, and every class and type of WLAN security solution available on the market, from wireless intrusion prevention systems to wireless network management systems.

Inquire About
Enterprise Wi-Fi Security (CWSP)

Ideal Candidates for Enterprise Wi-Fi Security (CWSP) Class

Wireless professionals looking to gain cutting-edge wireless security expertise and earn the CWSP credential

Enterprise Wi-Fi Security (CWSP) Prerequisites

There Are No PreRequisites Defined for this Course

What You'll Get in Enterprise Wi-Fi Security (CWSP)

What You'll Learn in Enterprise Wi-Fi Security (CWSP)

WLAN security technology and solutions
WLAN security policy, concerns, and auditing practices
Layer vulnerabilities and analysis
WLAN mobile endpoint security solutions
WPA/WPA2 Personal and Enterprise configurations
WLAN management and monitoring
IEEE 802.11 Authentication and Key Management (AKM)

Enterprise Wi-Fi Security (CWSP) Certification

Certified Wireless Security Professional (CWSP) Certification

Enterprise Wi-Fi Security (CWSP) Outline

1. Introduction to WLAN Security Technology

  • Security policy
  • Security concerns
  • Security auditing practices
  • Application layer vulnerabilities and analysis
  • Data Link layer vulnerabilities and analysis
  • Physical layer vulnerabilities and analysis
  • 802.11 security mechanisms
  • Wi-Fi Alliance security certifications

2. Small Office/Home Office WLAN Security Technology and Solutions

  • WLAN discovery equipment and utilities
  • Legacy WLAN security methods, mechanisms, and exploits
  • Appropriate SOHO security

3. WLAN Mobile Endpoint Security Solutions

  • Personal-class mobile endpoint security
  • Enterprise-class mobile endpoint security
  • User-accessible and restricted endpoint policies
  • VPN technology overview

4. Branch Office/Remote Office WLAN Security Technology and Solutions

  • General vulnerabilities
  • Preshared Key security with RSN cipher suites
  • Passphrase vulnerabilities
  • Passphrase entropy and hacking tools
  • WPA/WPA2 Personal
    • How it works
    • Configuration
  • Wi-Fi Protected Setup (WPS)
  • Installation and configuration of WIPS, WNMS, and WLAN controllers to extend enterprise security policy to remote and branch offices

5. Enterprise WLAN Management and Monitoring

  • Device identification and tracking
  • Rogue device mitigation
  • WLAN forensics
  • Enterprise WIPS installation and configuration
  • Distributed protocol analysis
  • WNMS security features
  • WLAN controller security feature sets

6. Enterprise WLAN Security Technology and Solutions

  • Robust Security Networks (RSN)
  • WPA/WPA2 Enterprise
    • How it works
    • Configuration
  • IEEE 802.11 Authentication and Key Management (AKM)
  • 802.11 cipher suites
  • Authentication services (RADIUS, LDAP) in WLANs
  • User profile management (RBAC)
  • Public Key Infrastructures (PKIs) used with WLANs
  • Certificate Authorities and x.509 digital certificates
  • RADIUS installation and configuration
  • 802.1X/EAP authentication mechanisms
  • 802.1X/EAP types and differences
  • 802.11 handshakes
  • Fast BSS Transition (FT) technologies

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

In this Wi-Fi fundamentals course, you will gain the knowledge needed to enter into or advance within the wireless networking industry. From basic RF theory and regulatory requirements to implementation of WLAN devices, you will get up-to-speed on the latest in 802.11 technologies in a practical way.



The CWNA certification is the foundation-level enterprise Wi-Fi certification for the CWNP Program. Achieving it sets your wireless career on a firm foundation, ensuring you have the skills to successfully survey, install, and administer enterprise Wi-Fi networks. In this hands-on course, you will gain a full understanding of how radio frequency affects networking so you can perform site surveys, design a high-performance network, and protect both users and sensitive data from potential intruders. Plus, you will explore advanced topics such as VoWLAN deployments, seamless mobile connectivity, and detailed wireless frame analysis. You will use enterprise-class hardware and software tools during live lab exercises, simulating a state-of-the-art production environment.



© 2017 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W