Why tis Wi-Fi Security Course?
This Superior course from LEVER – the World’s First CWNP GOLD Learning Partner (2009 – 2016) – includes:
- Official and Comprehensive WCC Training and Reference Manuals (x2 manuals)
- Comprehensive, Sybex CWSP-205 Exam Study Guide – the CWSP Study Guide preferred by experienced Wi-Fi network engineers
- Official WCC-700 CWSM Theory Exam Voucher
- Official WCC-710 CWSM Practical Exam Voucher
- Official and Comprehensive WCC Training and Reference Manuals (x2 manuals)The World’s leading 5-day Wi-Fi Network Security training course
- 40 hours of Expert training from Europe’s Leading Wi-Fi Engineer Training and Certification company
- WCC-approved Wireless Security Policy templates, methodologies, knowledge and training to help you Design, Write and Implement State-of-the-Art Wireless Security Policy
- Unrivalled course content, full-colour courseware, exam-prep materials, hands-on labs, expert advice from the UK’s leading Wi-Fi network engineering Company
- Lifetime Post-Training Support – to help you in your future career.
WiFi Security Course Benefits
Today, every organisation – large or small – needs a fit-for-purpose IT Security Policy which includes state-of-the-art Wireless Security Policy.
- This is the Industry-leading WCC™ Certified Wireless Security Manager™ course
- The most up-to-date Wireless Security course available
- Learn how to Design, Write and Implement Effective and Auditable Wireless Security Policy
- Ensure your organisation’s Wireless Security Policy is valid and fit-for-purpose
- Understand the latest WiFi Security technologies, including WPA3 and Hotspot 2.0
- Understand Wi-Fi security in depth, including WEP, TKIP, CCMP, WPA, WPA2, WPA3, EAP, RADIUS and PKI / Certificate-based Authentication
- Implement all mainstream EAP types with static and dynamic VLANs
- Get hands-on experience with the latest Wireless Hacking tools
- Implement a range of WIDS and WIPS from leading vendors
- Understand the Security features of Bluetooth, ZigBee, WiGig, Wi-Fi HaLow, 802.11af and DECT cordless phones
- Prepare for CertiTrek CWSP® Certification
- Prepare for the WCC Certified Wireless Security Manager™ (CWSM) Certification Exams
- Get extensive hands-on practical experience with comprehensive Wi-Fi Security labs
- Take the WCC™ Certified Wireless Security Manager™ (CWSM™) Practical Certification Exam WCC-710 during the course
CWSM™ is an Advanced-level (WCC Level 3) Wi-Fi Security Certification which qualifies network engineers and IT Security professionals to secure Wi-Fi networks to WCC Level 3 Standards.
WiFi Security Training Course Objectives
On completing this course, you will be able to:
- Understand the latest Wi-Fi security standards and practices.
- Design and write state-of the-art wireless security policies.
- Implement effective wireless security policies which are verifiably fit-for-purpose.
- Understand Wi-Fi network security in depth.
- Understand the weaknesses of WEP, WPA, WPA2-Personal, TKIP, CCMP, 802.1X and specific EAP methods.
- Secure Wi-Fi networks using WPA2 and WPA3 in Enterprise mode and Personal mode.
- Implement User / Group Policy for Role-Based Access Control (RBAC).
- Understand IEEE 802.1X/EAP and multiple EAP types.
- Work with RADIUS servers, dynamically-assigned VLANs, multiple SSIDs and more.
- Understand how Wireless Penetration Testing (wireless PEN testing) should be conducted.
- Ensure that your Wireless networks are secure and compliant with your Security Policy.
- Prepare for the Certitrek Certified Wireless Security Professional (CWSP) and WCC™ Certified Wireless Security Manager™ (CWSM™) certifications.
Who should attend this WiFi Security course
- IT security professionals and network security auditors.
- All professionals responsible for maintaining the security of Wi-Fi Networks.
- Wi-Fi networking professionals wishing to acquire the Certitrek CWSP® or WCC™ Certified Wireless Security Manager™ (CWSM™) certifications.
- Experienced networking professionals wanting the critical skills needed to secure and audit wireless networks.
WiFi Security Course Pre-requisites
Before attending this course, delegates should attend the WCC™ Certified Wireless Network Manager™ course; or have a current Certitrek CWNA certification; or equivalent detailed knowledge of the 802.11 / Wi-Fi Physical and MAC layers, and practical Wi-Fi network operations.
WiFi Security Certification
This course provides the necessary training to help existing CWNA® or CWNM™ -certified WLAN professionals prepare for the WCC Certified Wireless Security Manager™ (CWSM™) Certification Exams WCC-700 and WCC-710.
WiFi Security Examination
On successful completion of the course, students have the opportunity to take the 4-hour WCC CWSM® Practical Exam – WCC-710. The course price includes examination vouchers for the the 2-hour WCC CWSM™ Theory Exam WCC-700 and the WCC-710 practical exam (valid for the week during which the course is attended).
Lifetime Post-Course Support
After completing this WiFi Security training course, delegates receive lifetime post-training support from LEVER Technology Group, to help them apply the technologies and skills they have learned with us, to provide career-long support, and to ensure they are better equipped for their future roles in IT and networking.
WiFi Security Training Course Content
IT Security Policy
- The Role of IT Security policy
- Some key IT Security concerns
- The Purpose and Structure of a good Security Policy
- Security Auditing Best Practices
Introduction to Wi-Fi Security Concepts
- Application layer vulnerabilities and analysis
- 802.11 / WiFi Data Link layer vulnerabilities and analysis
- 802.11 Physical layer vulnerabilities and analysis
- 802.11 / Wi-Fi security mechanisms
- 802.11 Legacy security mechanisms and exploits
- Wi-Fi Alliance security certifications
- WiFi Client Security Solutions
- Enterprise-class client security
WiFi Network Vulnerabilities
- WiFi Monitor mode
- Wardriving Access Points
- Wardriving Stations
- ARP poisoning
- Denial of Service attacks
- RF DOS
- Frame-level DOS
- Queensland Attack
- Rogue Access Points
- Rogue Stations
- Cafe Latte attack
SOHO and SMB WLAN Security Technologies and Solutions
- General vulnerabilities
- WPA Pre-Shared Key security with RSN cipher suites
- WPA/WPA2 Personal operation
- Configuring WPA/WPA2 Personal security
- WPA Passphrase vulnerabilities
- Passphrase entropy
- WPA Passphrase hacking tools
- TKIP Key Generation and Management
- WPA and WPA2 4-way handshakes
- Key mixing
- Attacks against TKIP
- Client-side dictionary attack
- Block ciphers
- Attacks against CCMP
- WiFi Protected Setup (WPS)
- The roles of:
- WLAN controllers
- Wireless Network Management Systems (WNMS)
- Wireless Intrusion Protection Systems (WIPS)
Enterprise WiFi Network Management and Monitoring
- Client device identification and location
- Rogue device detection, location and mitigation
- WiFi security forensics and data logging
- Enterprise WIPS installation and configuration
- Protocol analysis
- Security capabilities of
Enterprise-grade WiFi network Security
- Robust Security Networks (RSN)
- WPA/WPA2 Enterprise operation
- The 802.1X/EAP architecture
- Extensible Authentication Protocol (EAP)
- Review of EAP types and capabilities
- RADIUS architecture and protocol
- RADIUS and LDAP authentication services
- Role Based Access Control (RBAC)
- Configuring WPA/WPA2 Enterprise security
- 802.11 Authentication and Key Management (AKM)
- Operation of EAP-TLS, PEAP-MSCHAPv2, PEAP-TLS and more
- EAP-TLS weaknesses
- PEAP weaknesses
- User profile management
- Public Key cryptography
- X.509 Certificates
- Using Public Key Infrastructures (PKI) with WiFi networks
- Certificate Authorities (CA) and CCITT X.509 digital certificates
- Installing and configuring a RADIUS server
- 802.11 handshakes and exchanges
- Understanding BSS Transition
- Fast BSS Transition (FT)
- Fast Secure Roaming (FSR)
- Wi-Fi Certified Passpoint / HS 2.0 / HS2
- Generic Advertisement Service (GAS)
- Access Network Query Protocol (ANQP)
- WBA NGH
Wi-Fi Protected Access 3 (WPA3)
- Overview of Wi-Fi Alliance WPA3
- 192 bit encryption
- Opportunistic Wireless Encryption (OWE)
- Simultaneous Authentication of Equals (SAE)
- Diffie-Hellman key exchange, PAKE, SPEKE
- Offline Dictionary Attack Resistance
- Dragonfly Key Exchange
- WPA3 Easy Connect
- Device Provisioning Protocol (DPP)
- WPA3 Enhanced Open
Supporting guest WiFi access
Wi-Fi Manufacturer Security Solutions
- Per-User Pre-Shared Key / Per-User PSK
- Dynamic Pre-Shared Key / Dynamic PSK (DPSK)
- Private Pre-Shared Key / Private PSK (PPSK)
- Identity Pre-Shared Key / Identity PSK
- EasyPass Personal
Bring Your Own Device (BYOD)
- Security Policy for BYOD
- Onboarding and Policy Enforcement
Wireless Security Monitoring
- Wireless Intrusion Detection Systems (WIDS)
- Wireless Intrusion Prevention Systems (WIPS)
- The limitations of commercial WIDS and WIPS
- Mojo Networks (AirTight)
- Marker Packet technology
- Automatic Device Classification and Threat Assessment
- Automated threat prevention
- Real-time troubleshooting and analysis
Wireless Penetration Testing
- Methods for Ethical Hacking WiFi networks
- Kismet, Airjack, Wifiphisher, CloudCracker, Ghost Phisher
- Aircrack-ng, Reaver, Pixiewps, Wifite, Fern Wifi Cracker, Macchanger, Wash, oclHashcat, Crunch
- The inadequacies of Wireless PEN Testing
Writing your Auditable Wireless Security Policy
- Implementing your WCC-compliant Wireless Security Policy
- Verifying your Wireless Security Policy
- Auditing Wireless Security Policy
- External Wireless Security Policy Audit
- Preparing for External Audit
Securing Everything Wireless
- The need for a Wider Wireless Security Policy
- Understanding other key wireless technlogies
- Bluetooth, ZigBee
- WiGig (802.11ad)
- IoT wireless security
- Wi-Fi HaLow (802.11ah)
- DECT (Digital Enhanced Cordless Telecommunications)
- 900 MHz systems
- 868 MHz, European Low Power Networks (LPWAN), Sigfox, LoRaWan
- 863 – 870 MHz systems
- RFID systems
- NFC (Near Field Communications)
- Writing and Implementing your Broader Wireless Security Policy
- Certitrek® CWNP® CWNA® CWSP® CWAP® CWDP® and CWNE® are registered trademarks of Certitrek Group LLC
- Wi-Fi® is a registered trademark of Wi-Fi Alliance
- All other trademarks are the property of their respective owners
- See also Important Notices