A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming.

  • Certified Wireless Network Associate
  • Demonstrate the threats to WiFi networks.
  • Secure WiFi networks.
  • Configure
  • Pass the CWSP exam

WLAN Security overview

Standards, security basics, AAA, 802.11 security history.
Hands on: WLAN connectivity.


Legacy 802.11 security

Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking.
Hands on: Analysing 802.11 frame exchanges, viewing hidden SSIDs


Encryption

Basics, AES, TKIP, CCMP, WPA, WPA2.
Hands on: Decrypting 802.11 data frames.


802.11 layer 2 authentication

802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP-PEAP, EAP-TTLS, EAP-TLS, EAP-FAST.
Hands on: Analysing 802.1X/EAP frames.


802.11 layer 2 dynamic key generation

Robust Security Network.
Hands on: Authentication and key management.


SOHO 802.11 security

WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS).
Hands on: PSK mapping


WLAN security infrastructure

DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC.
Hands on: 802.1X/EAP configuration. RADIUS configuration.


802.11 Fast secure roaming

History, RSNA, OKC, Fast BSS transition, 802.11k.
Hands on: Roaming.


Wireless security risks

Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots.
Hands on: Backtrack.


WiFi security auditing

History, RSNA, OKC, Fast BSS transition, 802.11k.
Hands on: Roaming.


Wireless security risks

Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots.
Hands on: Backtrack.


WiFi security auditing

Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools.


WiFi security monitoring

Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w.
Hands on: Laptop spectrum analysers.


VPNs, remote access, guest access

Role of VPNs in 802.11, remote access, hotspots, captive portal.


Wireless security policies

General policy, functional policy, recommendations.

Sorry, we don't have any available dates! Please complete this form to be notified about new dates

Hide form
Please type in a preferred location or region...