Your Course Includes
Comprehensive Training and Reference Manuals (x2) – more than 400 pages in total
Comprehensive, Sybex CWSP Exam Study Guide – the Study Guide preferred by experienced Wi-Fi network engineers
The World’s leading Wi-Fi Security training course
Expert training from Europe’s Leading Wi-Fi Engineer Training and Certification company
Unrivalled course content, full-colour courseware, exam-prep materials, hands-on labs, expert advice from the UK’s leading Wi-Fi engineering company.
Lifetime Post-Training Support – to help you throughout your future career.
Why this CWSP-207 course?
- Get the best Wi-Fi Security training available anywhere in the World.
- Delivered by Industry-leading experts.
- Learn essential techniques and insider secrets not taught on other WiFi Security courses.
- Work with WPA3-Enterprise, OWE, SAE,
- Get in-depth WiFi Security auditing skills.
- Get Lifetime Post-Course Support from LEVER – the industry leader in Wi-Fi Network Engineering.
Get the skills to define Wireless Security Policy and implement enterprise-grade Wireless security.
The CWSP course is also designed to help attendees prepare for the Certitrek CWSP-207 Certified Wireless Security Professional (CWSP) exam.
Who should attend this CWSP course
- All wireless network professionals
- IT Security Professionals
- Network Architects
- Experienced IT professionals wanting the critical skills to secure wireless networks.
Completing CWSP Training and Certification is the clearest way to demonstrate competence in Enterprise Wi-Fi Wireless LAN security.
CWSP Course Pre-requisites
Delegates should have attended the CWNA course, or acquired CWNA certification prior to attending this course.
CWSP Certification
This course helps attendees prepare for the Certitrek Certified Wireless Security Professional exam (CWSP) CWSP-207. Attendees also receive their Certificate of training course attendance.
Hands-on Practicals
LEVER courses incorporate more hands-on practical labs and demonstrations than other industry courses.
802.1X/EAP Configuration
WPA/WPA2-Enterprise relies on secure authentication via IEEE 802.1X/EAP, often using enterprise directory authentication infrastructure, including RADIUS servers.
WPA3 – OWE, SAE
Wireless Intrusion Prevention Systems (WIPS)
WIPS provide three key functions: security monitoring, performance monitoring and reporting.
Fast Secure Roaming (FSR / FT)
Moving quickly and securely between access points attached is a requirement of real-time mobility devices such as VoWiFi phones and mobile video devices. Understanding the standards-based and proprietary processes of a Fast Transition (FT) service helps network designers support strong security and fast roaming simultaneously.
Network Attacks and Auditing
Defensive network security requires an understanding of offensive attacks. Wireless security auditing should include the validation of security solutions, and understanding auditing tools is an important skill.
Lifetime Post-Course Support
On completing this CWSP training course, delegates receive lifetime post-training support from LEVER Technology Group, to help them apply the technologies and skills they have learned with us, to provide career-long support, and to ensure they are better equipped for their future roles in IT and networking.
CWSP Training Course Content
WLAN Discovery Techniques
Introduction to WLAN Security Technology
- Security policy
- Security concerns
- Security auditing practices
- Application layer vulnerabilities and analysis
- Data Link layer vulnerabilities and analysis
- Physical layer vulnerabilities and analysis
- 802.11 security mechanisms
- Legacy WLAN security methods, mechanisms, and exploits
- Wi-Fi Alliance security certifications
Intrusion and Attack Techniques
802.11 Protocol Analysis
WLAN Mobile Endpoint Security Solutions
Wireless Intrusion Prevention Systems (WIPS) Implementation
- Enterprise-class mobile endpoint security
- User-accessible and restricted endpoint policies
- VPN technologies common for client devices
SOHO and SMB WLAN Security Technologies and Solutions
- General vulnerabilities
- Preshared Key security with RSN cipher suites
- Passphrase vulnerabilities
- Passphrase entropy and hacking tools
- WPA/WPA2 Personal: how it works
- WPA/WPA2 Personal: configuration
- Installation and configuration of WIPS, WNMS, and WLAN controllers to extend enterprise security policy to remote and branch offices
- Remote/branch office VPN technologies common for infrastructure devices
Enterprise WLAN Management and Monitoring
- Device identification and tracking
- Rogue device detection and mitigation
- WLAN forensics and data logging
- Enterprise WIPS installation and configuration
- Protocol analysis
- WNMS security features
- WLAN controller security feature sets
Enterprise WLAN Security Technology and Solutions
- Robust Security Networks (RSN)
- WPA/WPA2 Enterprise: how it works
- WPA/WPA2 Enterprise: configuration
- IEEE 802.11 Authentication and Key Management (AKM)
- 802.11 cipher suites
- Use of authentication services (RADIUS, LDAP) in WLANs
- User profile management (RBAC)
- Public Key Infrastructures (PKI) used with WLANs
- Certificate Authorities and X.509 digital certificates
- RADIUS installation and configuration
- 802.1X/EAP authentication mechanisms
- EAP types and differences
- 802.11 handshakes and exchanges
- Fast BSS Transition (FT) technologies (FSR: Fast Secure Roaming)
- Captive portals and guest networking
Wireless LAN Management Systems (WNMS)
Authentication Infrastructure Design Models
Using Secure Applications
802.11 Design Architectures
Implementing a Thorough Wireless Security Policy