+44 (0)1737 821590
Certified Wireless Security Professional  |    A 5 day   hands on   training course

CWSP training course description

A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming.

What will you learn
  • Demonstrate the threats to WiFi networks.
  • Secure WiFi networks.
  • Configure:
  • Pass the CWSP exam.
CWSP training course details

CWSP training course contents

  • WLAN Security overview
  • Standards, security basics, AAA, 802.11 security history.
    Hands on WLAN connectivity.

  • Legacy 802.11 security
  • Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking.
    Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs.

  • Encryption
  • Basics, AES, TKIP, CCMP, WPA, WPA2.
    Hands on Decrypting 802.11 data frames.

  • 802.11 layer 2 authentication
  • 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST.
    Hands on Analysing 802.1X/EAP frames.

  • 802.11 layer 2 dynamic key generation
  • Robust Security Network.
    Hands on Authentication and key management.

  • SOHO 802.11 security
  • WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS).
    Hands on PSK mapping.

  • WLAN security infrastructure
  • DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC.
    Hands on 802.1X/EAP configuration. RADIUS configuration.

  • 802.11 Fast secure roaming
  • History, RSNA, OKC, Fast BSS transition, 802.11k.
    Hands on Roaming.

  • Wireless security risks
  • Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots.
    Hands on Backtrack.

  • WiFi security auditing
  • Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools.

  • WiFi security monitoring
  • Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w.
    Hands on Laptop spectrum analysers.

  • VPNs, remote access, guest access
  • Role of VPNs in 802.11, remote access, hotspots, captive portal.

  • Wireless security policies
  • General policy, functional policy, recommendations.

Learning path



Based on overall ratings

B. M. - London Internet Exchange

"Excellent presentation - very good course structure."

B. M. - Purdicom

"I'm working in WiFi, it provides an invaluable insight."

Training approach

This structured training course seeks to build upon workbook learning through the use of group exercises, dynamic discussion and individual tasks in order to deliver an engaging and interactive module that will ensure all candidates are able to transfer their new skills into the workplace.