Certified Wireless Security Professional
This course is designed for those interested to learn the basics of wireless security which includes the basics of WLAN security, dynamic encryption key generation,wireless security risks and auditing, implementation of wireless security monitoring and the WLAN security infrastructure.
About This CourseBeginner
This course covers the functions and features of Certified Wireless Security Professional.
Students will learn the basics of WLAN security, Legacy security, encryption ciphers and methods, 802.11 authentication methods. They will then learn about dynamic encryption key generation, SOHO 802.11 security, fast secure roaming, wireless security risks, and wireless LAN security auditing.
They will also learn how to implement wireless security monitoring, VPNs, remote access and guest access services as wells as the WLAN security infrastructure.
Our Promise to You
By the end of this course, you will have learned about the functions and features of wireless security.
30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about wireless security.
Section 1 - WLAN Security Overview
WLAN Security Overview
Demo – Networking Basics
Demo – Web GUI Introduction
Demo – Security Options
Section 2 - Legacy Security
Demo – Security Associations
Demo – MAC Spoofing
Section 3 - Encryption Ciphers And Methods
Encryption Ciphers And Methods
Demo – Encryption Example
Section 4 - 802.11 Authentication Methods
802.11 Authentication Methods
Demo – Certificate Authority Server Credentials
Section 5 - Dynamic Encryption Key Generation
Dynamic Encryption Key Generation
Authentication And Key Management
RSNA Key Hierarchy
Demo – EAP
Demo – Information Elements
Section 6 - SOHO 802.11 Security
SOHO 802.11 Security
Wi-Fi Protected Setup
Demo – Cracking Hashes
Section 7 - Fast Secure Roaming
Fast Secure Roaming
FT Key Hierarchy: E-Notes
Section 8 - Wireless Security Risks
Wireless Security Risks
Demo – Rogue Devices
Demo – Public Hotspots
Section 9 - Wireless LAN Security Auditing
Wireless LAN Security Auditing
Section 10 - Wireless Security Monitoring
Wireless Security Monitoring
Section 11 - VPNs, Remote Access And Guest Access Services
VPNs, Remote Access And Guest Access Services
Section 12 - WLAN Security Infrastructure
WLAN Security Infrastructure
Other RADIUS Solutions
Section 13 - Wireless Security Policies
Wireless Security Policies
No Reviews found for this course.