About This Course
Who this course is for:
- The course is intended for the professionals working with the wireless network and looking to enhance their knowledge by learning the cutting-edge wireless security tools and techniques and earn the CWSP certification by CWNP
What you’ll learn:
- WLAN security
- Legacy security
- Encryption ciphers and methods
- 802.11 authentication methods
- Dynamic encryption key generation
- SOHO 802.11 security
- Fast secure roaming
- Wireless security risks
- Wireless LAN security auditing
- Wireless security monitoring
- VPNs
- Remote access and guest access services
Requirements:
- The students registering for this course are required to have studied the Certified Wireless Network Administrator (CWNA) course or passed the CWNA certification exam
This course covers the functions and features of Certified Wireless Security Professional.
Our Promise to You
By the end of this course, you will have learned about the functions and features of wireless security.
30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about wireless security.
Course Curriculum
Section 1 - WLAN Security Overview | |||
WLAN Security Overview | 00:00:00 | ||
Data Privacy | 00:00:00 | ||
Demo – Networking Basics | 00:00:00 | ||
Demo – Web GUI Introduction | 00:00:00 | ||
Demo – Security Options | 00:00:00 | ||
Section 2 - Legacy Security | |||
Legacy Security | 00:00:00 | ||
VPNs | 00:00:00 | ||
Demo – Security Associations | 00:00:00 | ||
Demo – MAC Spoofing | 00:00:00 | ||
Section 3 - Encryption Ciphers And Methods | |||
Encryption Ciphers And Methods | 00:00:00 | ||
TKIP | 00:00:00 | ||
CCMP | 00:00:00 | ||
Demo – Encryption Example | 00:00:00 | ||
Section 4 - 802.11 Authentication Methods | |||
802.11 Authentication Methods | 00:00:00 | ||
802.1X | 00:00:00 | ||
EAP | 00:00:00 | ||
Demo – Certificate Authority Server Credentials | 00:00:00 | ||
Section 5 - Dynamic Encryption Key Generation | |||
Dynamic Encryption Key Generation | 00:00:00 | ||
Authentication And Key Management | 00:00:00 | ||
RSNA Key Hierarchy | 00:00:00 | ||
Demo – EAP | 00:00:00 | ||
Demo – Information Elements | 00:00:00 | ||
Section 6 - SOHO 802.11 Security | |||
SOHO 802.11 Security | 00:00:00 | ||
Wi-Fi Protected Setup | 00:00:00 | ||
Demo – Cracking Hashes | 00:00:00 | ||
Section 7 - Fast Secure Roaming | |||
Fast Secure Roaming | 00:00:00 | ||
PMKSA | 00:00:00 | ||
FT Key Hierarchy: E-Notes | 00:00:00 | ||
802.11K-2008 | 00:00:00 | ||
Section 8 - Wireless Security Risks | |||
Wireless Security Risks | 00:00:00 | ||
Authentication Attacks | 00:00:00 | ||
Demo – Rogue Devices | 00:00:00 | ||
Demo – Public Hotspots | 00:00:00 | ||
Section 9 - Wireless LAN Security Auditing | |||
Wireless LAN Security Auditing | 00:00:00 | ||
Section 10 - Wireless Security Monitoring | |||
Wireless Security Monitoring | 00:00:00 | ||
Device Tracking | 00:00:00 | ||
Section 11 - VPNs, Remote Access And Guest Access Services | |||
VPNs, Remote Access And Guest Access Services | 00:00:00 | ||
Remote Access | 00:00:00 | ||
Section 12 - WLAN Security Infrastructure | |||
WLAN Security Infrastructure | 00:00:00 | ||
Management Protocols | 00:00:00 | ||
Other RADIUS Solutions | 00:00:00 | ||
Section 13 - Wireless Security Policies | |||
Wireless Security Policies | 00:00:00 | ||
Other Policies | 00:00:00 | ||
Downloadable Materials | 00:00:00 |