 |
|
|
 |
|
The Certified Wireless Security
Professional (CWSP) certification builds on the
foundation of wireless LAN knowledge from the
CWNA certification by educating the candidate
about the security threats to and weaknesses of
wireless LANs. The main topics of this course
and the certification exam are hardware, software,
protocols, procedures, and design techniques used
in reducing wireless LAN security risks. Wireless
Security Certification & Training is an essential
step in developing your expertise in wireless
technologies.
This course will prepare participants to successfully
pass the CWSP
certification exam #PW0-200 to become a Certified
Wireless Security Professional(CWSP). |
|
|
|
|
|
Course Schedule |
|
Duration: call
To view the schedule for this class, click
here. |
|
Prerequisites |
|
Required : The required prerequisite for enrolling
in the CWSP class is passing the CWNA
exam, which is available at Prometric Testing Centers
worldwide.
Recommended : We recommend that all CWSP candidates
achieve either the SCP or Security + certifications
prior to attending a CWSP class. |
|
Course Outline |
|
CWSP Training & Certification will cover the
following topics:
Risk Assessment
- Assets to protect
- Threats to protect against
- Legal protection
- Costs
- Basic security measures
- Threat analysis
- Impact analysis
Threat Analysis & Hacking Methodolog
- Target profiling
- Physical security
- Social engineering
- Wireless bridges
- Packet analysis
- Information theft
- Malicious data insertion
- Denial of Service (DoS)
- Peer-to-peer hacking
- Unauthorized control
Rudimentary Security Measures
- SSID
- MAC filters
- Static WEP
- Default configurations
- Firmware upgrades
- Physical security
- Periodic inventory
Intermediate Security Measures
- Rogue equipment
- Cell sizing
- Protocol filters
- SNMP
- Discovery protocols
- Wireless segment configuration
- Remove vulnerabilities
- Client security
- IP Services
Advanced Security Measures
- Wireless security policy
- Authentication & encryption
- Wireless DMZ and VLANs
- Audits
- Traffic pattern analysis
- Authenticated DHCP
Wireless LAN Auditing Tools
- Discovery tools
- Password crackers
- Share enumerators
- Network management and control
- Wireless protocol analyzers
- Manufacturer defaults
- Password sniffers
- Antennas and WLAN equipment
- OS fingerprinting and port scanning
- Application sniffers
- Networking utilities
- Network discovery and management
- Hijacking users
- RF Jamming and Dataflooding tools
- WEP crackers
Hardware & Software Solutions
- RADIUS with AAA Support
- RADIUS Details
- Kerberos
- Static and Dynamic WEP and TKIP
- 802.1x
- Extensible Authentication Protocol (EAP)
- VPNs
- Encryption Schemes
- Routers
- Switch-Routers
- Firewalls
- MobileIP VPN Solutions
- Enterprise Wireless Gateways
- Switches, VLANs, & Hubs
- SSH2 Tunneling & Port Redirection
- Thin Client Solutions
Prevention & Countermeasures
- 802.1x
- 802.11i
- TKIP
- AES
- Intrusion detection
- US Federal and state laws
Implementation and Management
- Design and implementation
- Equipment configuration and placement
- Interoperability and layering
- Security management
|
|