Training Course

WCC Certified Wi-Fi Security Manager™ (CWSM™)

  • CWSM
  • £2,895 +VAT
  • 4 days

Why tis Wi-Fi Security Course?

This Superior course from LEVER – the World’s First CWNP GOLD Learning Partner (2009 – 2016) – includes:

  • Official and Comprehensive WCC Training and Reference Manuals (x2 manuals)
  • Comprehensive, Sybex CWSP-205 Exam Study Guide – the CWSP Study Guide preferred by experienced Wi-Fi network engineers
  • Official WCC-700 CWSM Theory Exam Voucher
  • Official WCC-710 CWSM Practical Exam Voucher
  • Official and Comprehensive WCC Training and Reference Manuals (x2 manuals)The World’s leading 5-day Wi-Fi Network Security training course
  • 40 hours of Expert training from Europe’s Leading Wi-Fi Engineer Training and Certification company
  • WCC-approved Wireless Security Policy templates, methodologies, knowledge and training to help you Design, Write and Implement State-of-the-Art Wireless Security Policy
  • Unrivalled course content, full-colour courseware, exam-prep materials, hands-on labs, expert advice from the UK’s leading Wi-Fi network engineering Company
  • Lifetime Post-Training Support – to help you in your future career.

WiFi Security Course Benefits

Today, every organisation – large or small – needs a fit-for-purpose IT Security Policy which includes state-of-the-art Wireless Security Policy.

  • This is the Industry-leading WCC™ Certified Wireless Security Manager™ course
  • The most up-to-date Wireless Security course available
  • Learn how to Design, Write and Implement Effective and Auditable Wireless Security Policy
  • Ensure your organisation’s Wireless Security Policy is valid and fit-for-purpose
  • Understand the latest WiFi Security technologies, including WPA3 and Hotspot 2.0
  • Understand Wi-Fi security in depth, including WEP, TKIP, CCMP, WPA, WPA2, WPA3, EAP, RADIUS and PKI / Certificate-based Authentication
  • Implement all mainstream EAP types with static and dynamic VLANs
  • Get hands-on experience with the latest Wireless Hacking tools
  • Implement a range of WIDS and WIPS from leading vendors
  • Understand the Security features of Bluetooth, ZigBee, WiGig, Wi-Fi HaLow, 802.11af and DECT cordless phones
  • Prepare for CertiTrek CWSP® Certification
  • Prepare for the WCC Certified Wireless Security Manager™ (CWSM) Certification Exams
  • Get extensive hands-on practical experience with comprehensive Wi-Fi Security labs
  • Take the WCC™ Certified Wireless Security Manager™ (CWSM™) Practical Certification Exam WCC-710 during the course

CWSM™ is an Advanced-level (WCC Level 3) Wi-Fi Security Certification which qualifies network engineers and IT Security professionals to secure Wi-Fi networks to WCC Level 3 Standards.

WiFi Security Training Course Objectives

On completing this course, you will be able to:

  • Understand the latest Wi-Fi security standards and practices.
  • Design and write state-of the-art wireless security policies.
  • Implement effective wireless security policies which are verifiably fit-for-purpose.
  • Understand Wi-Fi network security in depth.
  • Understand the weaknesses of WEP, WPA, WPA2-Personal, TKIP, CCMP, 802.1X and specific EAP methods.
  • Secure Wi-Fi networks using WPA2 and WPA3 in Enterprise mode and Personal mode.
  • Implement User / Group Policy for Role-Based Access Control (RBAC).
  • Understand IEEE 802.1X/EAP and multiple EAP types.
  • Work with RADIUS servers, dynamically-assigned VLANs, multiple SSIDs and more.
  • Understand how Wireless Penetration Testing (wireless PEN testing) should be conducted.
  • Ensure that your Wireless networks are secure and compliant with your Security Policy.
  • Prepare for the Certitrek Certified Wireless Security Professional (CWSP) and WCC™ Certified Wireless Security Manager™ (CWSM™) certifications.

Who should attend this WiFi Security course

  • IT security professionals and network security auditors.
  • All professionals responsible for maintaining the security of Wi-Fi Networks.
  • Wi-Fi networking professionals wishing to acquire the Certitrek CWSP® or WCC™ Certified Wireless Security Manager™ (CWSM™) certifications.
  • Experienced networking professionals wanting the critical skills needed to secure and audit wireless networks.

WiFi Security Course Pre-requisites

Before attending this course, delegates should attend the WCC™ Certified Wireless Network Manager™ course; or have a current Certitrek CWNA certification; or equivalent detailed knowledge of the 802.11 / Wi-Fi Physical and MAC layers, and practical Wi-Fi network operations.

WiFi Security Certification

This course provides the necessary training to help existing CWNA® or CWNM™ -certified WLAN professionals prepare for the WCC Certified Wireless Security Manager™ (CWSM™) Certification Exams WCC-700 and WCC-710.

WiFi Security Examination

On successful completion of the course, students have the opportunity to take the 4-hour WCC CWSM® Practical Exam – WCC-710. The course price includes examination vouchers for the the 2-hour WCC CWSM™ Theory Exam WCC-700 and the WCC-710 practical exam (valid for the week during which the course is attended).

Lifetime Post-Course Support

After completing this WiFi Security training course, delegates receive lifetime post-training support from LEVER Technology Group, to help them apply the technologies and skills they have learned with us, to provide career-long support, and to ensure they are better equipped for their future roles in IT and networking.

WiFi Security Training Course Content

IT Security Policy

  • The Role of IT Security policy
  • Some key IT Security concerns
  • The Purpose and Structure of a good Security Policy
  • Security Auditing Best Practices

Introduction to Wi-Fi Security Concepts

  • Application layer vulnerabilities and analysis
  • 802.11 / WiFi Data Link layer vulnerabilities and analysis
  • 802.11 Physical layer vulnerabilities and analysis
  • 802.11 / Wi-Fi security mechanisms
  • 802.11 Legacy security mechanisms and exploits
  • Wi-Fi Alliance security certifications
  • WiFi Client Security Solutions
  • Enterprise-class client security

WiFi Network Vulnerabilities

  • WiFi Monitor mode
  • Wardriving Access Points
  • Wardriving Stations
  • Eavesdropping
  • ARP poisoning
  • Denial of Service attacks
  • RF DOS
  • Frame-level DOS
  • Queensland Attack
  • Rogue Access Points
  • Rogue Stations
  • Cafe Latte attack

SOHO and SMB WLAN Security Technologies and Solutions

  • General vulnerabilities
  • WPA Pre-Shared Key security with RSN cipher suites
  • WPA/WPA2 Personal operation
  • Configuring WPA/WPA2 Personal security
  • WPA Passphrase vulnerabilities
  • Passphrase entropy
  • WPA Passphrase hacking tools
  • TKIP Key Generation and Management
  • WPA and WPA2 4-way handshakes
  • Key mixing
  • Attacks against TKIP
  • Client-side dictionary attack
  • Block ciphers
  • CCMP
  • Attacks against CCMP
  • WiFi Protected Setup (WPS)
  • The roles of:
    • WLAN controllers
    • Wireless Network Management Systems (WNMS)
    • Wireless Intrusion Protection Systems (WIPS)

Enterprise WiFi Network Management and Monitoring

  • Client device identification and location
  • Rogue device detection, location and mitigation
  • WiFi security forensics and data logging
  • Enterprise WIPS installation and configuration
  • Protocol analysis
  • Security capabilities of
    • WLAN Controllers
    • WNMS
    • WIPS

Enterprise-grade WiFi network Security

  • Robust Security Networks (RSN)
  • WPA/WPA2 Enterprise operation
  • The 802.1X/EAP architecture
  • Extensible Authentication Protocol (EAP)
  • Review of EAP types and capabilities
  • RADIUS architecture and protocol
  • RADIUS and LDAP authentication services
  • Role Based Access Control (RBAC)
  • Configuring WPA/WPA2 Enterprise security
  • 802.11 Authentication and Key Management (AKM)
  • Operation of EAP-TLS, PEAP-MSCHAPv2, PEAP-TLS and more
  • EAP-TLS weaknesses
  • PEAP weaknesses
  • User profile management
  • Public Key cryptography
  • X.509 Certificates
  • Using Public Key Infrastructures (PKI) with WiFi networks
  • Certificate Authorities (CA) and CCITT X.509 digital certificates
  • Installing and configuring a RADIUS server
  • 802.11 handshakes and exchanges
  • Understanding BSS Transition
  • Fast BSS Transition (FT)
  • Fast Secure Roaming (FSR)

Hotspot 2.0

  • Wi-Fi Certified Passpoint / HS 2.0 / HS2
  • 802.11u
  • Generic Advertisement Service (GAS)
  • Access Network Query Protocol (ANQP)

Wi-Fi Protected Access 3 (WPA3)

  • Overview of Wi-Fi Alliance WPA3
  • 192 bit encryption
  • Opportunistic Wireless Encryption (OWE)
  • Simultaneous Authentication of Equals (SAE)
  • Diffie-Hellman key exchange, PAKE, SPEKE
  • Offline Dictionary Attack Resistance
  • Dragonfly Key Exchange
  • WPA3 Easy Connect
  • Device Provisioning Protocol (DPP)
  • WPA3 Enhanced Open

Supporting guest WiFi access

  • Captive portals

Wi-Fi Manufacturer Security Solutions

  • Per-User Pre-Shared Key / Per-User PSK
  • Dynamic Pre-Shared Key / Dynamic PSK (DPSK)
  • Private Pre-Shared Key / Private PSK (PPSK)
  • Identity Pre-Shared Key / Identity PSK
  • EasyPass Personal

Bring Your Own Device (BYOD)

  • Security Policy for BYOD
  • Onboarding and Policy Enforcement

Wireless Security Monitoring

  • Wireless Intrusion Detection Systems (WIDS)
  • Wireless Intrusion Prevention Systems (WIPS)
  • The limitations of commercial WIDS and WIPS
  • Mojo Networks (AirTight)
  • Marker Packet technology
  • Automatic Device Classification and Threat Assessment
  • Automated threat prevention
  • Real-time troubleshooting and analysis

Wireless Penetration Testing

  • Methods for Ethical Hacking WiFi networks
  • Kismet, Airjack, Wifiphisher, CloudCracker, Ghost Phisher
  • Aircrack-ng, Reaver, Pixiewps, Wifite, Fern Wifi Cracker, Macchanger, Wash, oclHashcat, Crunch
  • The inadequacies of Wireless PEN Testing

Writing your Auditable Wireless Security Policy

  • Implementing your WCC-compliant Wireless Security Policy
  • Verifying your Wireless Security Policy
  • Auditing Wireless Security Policy
  • External Wireless Security Policy Audit
  • Preparing for External Audit

Securing Everything Wireless

  • The need for a Wider Wireless Security Policy
  • Understanding other key wireless technlogies
  • Bluetooth, ZigBee
  • WiGig (802.11ad)
  • IoT wireless security
  • Wi-Fi HaLow (802.11ah)
  • 802.11af
  • DECT (Digital Enhanced Cordless Telecommunications)
  • 900 MHz systems
  • 868 MHz, European Low Power Networks (LPWAN), Sigfox, LoRaWan
  • 863 – 870 MHz systems
  • RFID systems
  • NFC (Near Field Communications)
  • Writing and Implementing your Broader Wireless Security Policy

Copyright Statements

  • Certitrek® CWNP® CWNA® CWSP® CWAP® CWDP® and CWNE® are registered trademarks of Certitrek Group LLC
  • Wi-Fi® is a registered trademark of Wi-Fi Alliance
  • All other trademarks are the property of their respective owners
  • See also Important Notices
Repair, Installation, Training & Support

Get Started

We’ll find the solution, performance guaranteed.
Get in touch to find out more.

Contact Us

Type something below and press return to search or click a related link:

X Close Search