About This Course
This course covers the functions and features of Certified Wireless Security Professional.
Students will learn the basics of WLAN security, Legacy security, encryption ciphers and methods, 802.11 authentication methods. They will then learn about dynamic encryption key generation, SOHO 802.11 security, fast secure roaming, wireless security risks, and wireless LAN security auditing.
They will also learn how to implement wireless security monitoring, VPNs, remote access and guest access services as wells as the WLAN security infrastructure.
Our Promise to You
By the end of this course, you will have learned about the functions and features of wireless security.
30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about wireless security.
Course Curriculum
Section 1 - WLAN Security Overview | |||
WLAN Security Overview | 00:00:00 | ||
Data Privacy | 00:00:00 | ||
Demo – Networking Basics | 00:00:00 | ||
Demo – Web GUI Introduction | 00:00:00 | ||
Demo – Security Options | 00:00:00 | ||
Section 2 - Legacy Security | |||
Legacy Security | 00:00:00 | ||
VPNs | 00:00:00 | ||
Demo – Security Associations | 00:00:00 | ||
Demo – MAC Spoofing | 00:00:00 | ||
Section 3 - Encryption Ciphers And Methods | |||
Encryption Ciphers And Methods | 00:00:00 | ||
TKIP | 00:00:00 | ||
CCMP | 00:00:00 | ||
Demo – Encryption Example | 00:00:00 | ||
Section 4 - 802.11 Authentication Methods | |||
802.11 Authentication Methods | 00:00:00 | ||
802.1X | 00:00:00 | ||
EAP | 00:00:00 | ||
Demo – Certificate Authority Server Credentials | 00:00:00 | ||
Section 5 - Dynamic Encryption Key Generation | |||
Dynamic Encryption Key Generation | 00:00:00 | ||
Authentication And Key Management | 00:00:00 | ||
RSNA Key Hierarchy | 00:00:00 | ||
Demo – EAP | 00:00:00 | ||
Demo – Information Elements | 00:00:00 | ||
Section 6 - SOHO 802.11 Security | |||
SOHO 802.11 Security | 00:00:00 | ||
Wi-Fi Protected Setup | 00:00:00 | ||
Demo – Cracking Hashes | 00:00:00 | ||
Section 7 - Fast Secure Roaming | |||
Fast Secure Roaming | 00:00:00 | ||
PMKSA | 00:00:00 | ||
FT Key Hierarchy: E-Notes | 00:00:00 | ||
802.11K-2008 | 00:00:00 | ||
Section 8 - Wireless Security Risks | |||
Wireless Security Risks | 00:00:00 | ||
Authentication Attacks | 00:00:00 | ||
Demo – Rogue Devices | 00:00:00 | ||
Demo – Public Hotspots | 00:00:00 | ||
Section 9 - Wireless LAN Security Auditing | |||
Wireless LAN Security Auditing | 00:00:00 | ||
Section 10 - Wireless Security Monitoring | |||
Wireless Security Monitoring | 00:00:00 | ||
Device Tracking | 00:00:00 | ||
Section 11 - VPNs, Remote Access And Guest Access Services | |||
VPNs, Remote Access And Guest Access Services | 00:00:00 | ||
Remote Access | 00:00:00 | ||
Section 12 - WLAN Security Infrastructure | |||
WLAN Security Infrastructure | 00:00:00 | ||
Management Protocols | 00:00:00 | ||
Other RADIUS Solutions | 00:00:00 | ||
Section 13 - Wireless Security Policies | |||
Wireless Security Policies | 00:00:00 | ||
Other Policies | 00:00:00 | ||
Downloadable Materials | 00:00:00 |