Speak to our team now +44 (0)1737 821590

Certified Wireless Security Professional

A 5 day
HANDS ON
training course

CWSP training course description

A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming.

Key outcomes from this course

By the end of the course delegates will be able to:
  • Demonstrate the threats to WiFi networks.
  • Secure WiFi networks.
  • Configure:
    • WPA2
    • RADIUS
    • 802.1x
    • EAP
  • Pass the CWSP exam.

CWSP training course details

Who will benefit:
Technical network staff.
Technical security staff.
Prerequisites:
Certified Wireless Network Associate.
Duration:
5 days

Training approach

This structured training course seeks to build upon workbook learning through the use of group exercises, dynamic discussion and individual tasks in order to deliver an engaging and interactive module that will ensure all candidates are able to transfer their new skills into the workplace.

Overall ratings for this course:

Course review


"Hard concepts were explained very simply."
J. S., Framestore CFC
"Excellent presentation - very good course structure."
B. M., London Internet Exchange

CWSP training course contents


WLAN Security overview
Standards, security basics, AAA, 802.11 security history.
Hands on: WLAN connectivity.

Legacy 802.11 security
Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking.
Hands on: Analysing 802.11 frame exchanges, viewing hidden SSIDs

Encryption
Basics, AES, TKIP, CCMP, WPA, WPA2.
Hands on: Decrypting 802.11 data frames.

802.11 layer 2 authentication
802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP-PEAP, EAP-TTLS, EAP-TLS, EAP-FAST.
Hands on: Analysing 802.1X/EAP frames.

802.11 layer 2 dynamic key generation
Robust Security Network.
Hands on: Authentication and key management.

SOHO 802.11 security
WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS).
Hands on: PSK mapping

WLAN security infrastructure
DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC.
Hands on: 802.1X/EAP configuration. RADIUS configuration.

802.11 Fast secure roaming
History, RSNA, OKC, Fast BSS transition, 802.11k.
Hands on: Roaming.

Wireless security risks
Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots.
Hands on: Backtrack.

WiFi security auditing
History, RSNA, OKC, Fast BSS transition, 802.11k.
Hands on: Roaming.

Wireless security risks
Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots.
Hands on: Backtrack.

WiFi security auditing
Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools.

WiFi security monitoring
Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w.
Hands on: Laptop spectrum analysers.

VPNs, remote access, guest access
Role of VPNs in 802.11, remote access, hotspots, captive portal.

Wireless security policies
General policy, functional policy, recommendations.

Why Choose Us

SNT trainers score an average of over 90% on the three main areas of:
  • Ability to teach
  • Technical knowledge
  • Answering questions
“Excellently presented by a very knowledgeable and enthusiastic trainer.” P.D. General Dynamics

We limit our maximum class size to 8 delegates; often we have less than this. This ensures optimal interactivity between delegates and instructor.
"Excellent course. The small class size was a great benefit…" M.B. IBM

We write our own courses; courseware does not just consist of slides and our slides are diagrams not bullet point text. A typical chapter provides clearly defined objectives with a chapter overview, slides with text underneath, a quiz at the end to check the learning of the students. Hands on exercises are at the end and are used to reinforce the theory.

See Dates & Prices for this course

To enquire about this course

To reserve this course online