Training Course

Certified Wireless Security Professional (CWSP)

  • CWSP
  • £2,495 +VAT
  • 4 days
Show all

Your Course Includes

Comprehensive Training and Reference Manuals (x2) – more than 400 pages in total

Comprehensive, Sybex CWSP-205 Exam Study Guide – the Study Guide preferred by experienced Wi-Fi network engineers

The World’s leading Wi-Fi Security training course

Expert training from Europe’s Leading Wi-Fi Engineer Training and Certification company

Unrivalled course content, full-colour courseware, exam-prep materials, hands-on labs, expert advice from the UK’s leading Wi-Fi engineering company.

Lifetime Post-Training Support – to help you throughout your future career.

Why this CWSP-207 course?

  • Get the best Wi-Fi Security training available anywhere in the World.
  • Delivered by Industry-leading experts.
  • Learn essential techniques and insider secrets not taught on other WiFi Security courses.
  • Work with WPA3-Enterprise, OWE, SAE,
  • Get in-depth WiFi Security auditing skills.
  • Get Lifetime Post-Course Support from LEVER.

Get the skills to define Wireless Security Policy and implement enterprise-grade Wireless security.

The CWSP course is also designed to help attendees prepare for the Certitrek CWSP-207 Certified Wireless Security Professional (CWSP) exam.

Who should attend this CWSP course

  • All wireless network professionals
  • IT Security Professionals
  • Network Architects
  • Experienced IT professionals wanting the critical skills to secure wireless networks.

Completing CWSP Training and Certification is the clearest way to demonstrate competence in Enterprise Wi-Fi Wireless LAN security.

CWSP Course Pre-requisites

Delegates should have attended the CWNA course, or acquired CWNA certification prior to attending this course.

CWSP Certification

This course helps attendees prepare for the Certitrek Certified Wireless Security Professional exam (CWSP) CWSP-207. Attendees also receive their Certificate of training course attendance.

Hands-on Practicals

LEVER courses incorporate more hands-on practical labs and demonstrations than other industry courses.

802.1X/EAP Configuration
WPA/WPA2-Enterprise relies on secure authentication via IEEE 802.1X/EAP, often using enterprise directory authentication infrastructure, including RADIUS servers.

WPA3 – OWE, SAE

Wireless Intrusion Prevention Systems (WIPS)
WIPS provide three key functions: security monitoring, performance monitoring and reporting.

Fast Secure Roaming (FSR / FT)
Moving quickly and securely between access points attached is a requirement of real-time mobility devices such as VoWiFi phones and mobile video devices. Understanding the standards-based and proprietary processes of a Fast Transition (FT) service helps network designers support strong security and fast roaming simultaneously.

Network Attacks and Auditing
Defensive network security requires an understanding of offensive attacks. Wireless security auditing should include the validation of security solutions, and understanding auditing tools is an important skill.

Lifetime Post-Course Support

On completing this CWSP training course, delegates receive lifetime post-training support from LEVER Technology Group, to help them apply the technologies and skills they have learned with us, to provide career-long support, and to ensure they are better equipped for their future roles in IT and networking.

CWSP Training Course Content

Introduction to WLAN Security Technology

  • Security policy
  • Security concerns
  • Security auditing practices
  • Application layer vulnerabilities and analysis
  • Data Link layer vulnerabilities and analysis
  • Physical layer vulnerabilities and analysis
  • 802.11 security mechanisms
  • Legacy WLAN security methods, mechanisms, and exploits
  • Wi-Fi Alliance security certifications

WLAN Mobile Endpoint Security Solutions

  • Enterprise-class mobile endpoint security
  • User-accessible and restricted endpoint policies
  • VPN technologies common for client devices

SOHO and SMB WLAN Security Technologies and Solutions

  • General vulnerabilities
  • Preshared Key security with RSN cipher suites
  • Passphrase vulnerabilities
  • Passphrase entropy and hacking tools
  • WPA/WPA2 Personal: how it works
  • WPA/WPA2 Personal: configuration
  • Installation and configuration of WIPS, WNMS, and WLAN controllers to extend enterprise security policy to remote and branch offices
  • Remote/branch office VPN technologies common for infrastructure devices

Enterprise WLAN Management and Monitoring

  • Device identification and tracking
  • Rogue device detection and mitigation
  • WLAN forensics and data logging
  • Enterprise WIPS installation and configuration
  • Protocol analysis
  • WNMS security features
  • WLAN controller security feature sets

Enterprise WLAN Security Technology and Solutions

  • Robust Security Networks (RSN)
  • WPA/WPA2 Enterprise: how it works
  • WPA/WPA2 Enterprise: configuration
  • IEEE 802.11 Authentication and Key Management (AKM)
  • 802.11 cipher suites
  • Use of authentication services (RADIUS, LDAP) in WLANs
  • User profile management (RBAC)
  • Public Key Infrastructures (PKI) used with WLANs
  • Certificate Authorities and X.509 digital certificates
  • RADIUS installation and configuration
  • 802.1X/EAP authentication mechanisms
  • EAP types and differences
  • 802.11 handshakes and exchanges
  • Fast BSS Transition (FT) technologies (FSR: Fast Secure Roaming)
  • Captive portals and guest networking
Show all
Repair, Installation, Training & Support

Get Started

We’ll find the solution, performance guaranteed.
Get in touch to find out more.

Contact Us

Type something below and press return to search or click a related link:

X Close Search