Ideal Candidates for Enterprise Wi-Fi Security (CWSP) Class
Wireless professionals looking to gain cutting-edge wireless security expertise and earn the CWSP credential
Enterprise Wi-Fi Security (CWSP) Prerequisites
There Are No PreRequisites Defined for this Course
What You'll Get in Enterprise Wi-Fi Security (CWSP)
What You'll Learn in Enterprise Wi-Fi Security (CWSP)
WLAN security technology and solutionsWLAN security policy, concerns, and auditing practicesLayer vulnerabilities and analysisWLAN mobile endpoint security solutionsWPA/WPA2 Personal and Enterprise configurationsWLAN management and monitoringIEEE 802.11 Authentication and Key Management (AKM)
Enterprise Wi-Fi Security (CWSP) Certification
Certified Wireless Security Professional (CWSP) Certification
Enterprise Wi-Fi Security (CWSP) Outline
1. Introduction to WLAN Security
Technology
- Security policy
- Security concerns
- Security auditing
practices
- Application layer
vulnerabilities and analysis
- Data Link layer
vulnerabilities and analysis
- Physical layer
vulnerabilities and analysis
- 802.11 security
mechanisms
- Wi-Fi Alliance
security certifications
2. Small Office/Home Office WLAN
Security Technology and Solutions
- WLAN discovery
equipment and utilities
- Legacy WLAN security
methods, mechanisms, and exploits
- Appropriate SOHO
security
3. WLAN Mobile Endpoint Security
Solutions
- Personal-class mobile
endpoint security
- Enterprise-class
mobile endpoint security
- User-accessible and
restricted endpoint policies
- VPN technology
overview
4. Branch Office/Remote Office
WLAN Security Technology and Solutions
- General
vulnerabilities
- Preshared Key security
with RSN cipher suites
- Passphrase
vulnerabilities
- Passphrase entropy and
hacking tools
- WPA/WPA2 Personal
- How it works
- Configuration
- Wi-Fi Protected Setup
(WPS)
- Installation and
configuration of WIPS, WNMS, and WLAN controllers to extend enterprise
security policy to remote and branch offices
5. Enterprise WLAN Management and
Monitoring
- Device identification
and tracking
- Rogue device
mitigation
- WLAN forensics
- Enterprise WIPS
installation and configuration
- Distributed protocol
analysis
- WNMS security features
- WLAN controller
security feature sets
6. Enterprise WLAN Security
Technology and Solutions
- Robust Security
Networks (RSN)
- WPA/WPA2 Enterprise
- How it works
- Configuration
- IEEE 802.11
Authentication and Key Management (AKM)
- 802.11 cipher suites
- Authentication
services (RADIUS, LDAP) in WLANs
- User profile
management (RBAC)
- Public Key
Infrastructures (PKIs) used with WLANs
- Certificate
Authorities and x.509 digital certificates
- RADIUS installation
and configuration
- 802.1X/EAP
authentication mechanisms
- 802.1X/EAP types and
differences
- 802.11 handshakes
- Fast BSS Transition
(FT) technologies
Testimonials
A. Erlich
RITSC, N6CI just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.