Certified Wireless Security Professional - CWSP

CWNP | CWSP | Certified Wireless Security Professional

Certified Wireless Security Professional - CWSP

Vendor:  CWNP

Upcoming classes: See Class Calendar

Class Overview

This official Certified Wireless Security Professional , or CWSP, training class covers the Security aspects of Wireless Networking. In this class, students are taught about various forms of Security Technologies, Management, and Monitoring.

This training class demonstrates the latest enterprise wireless LAN security and auditing equipment. It addresses the state-of-the-art WLAN intrusion and DoS tools and techniques. It also investigates the functionality of the 802.11i amendment to the 802.11 standard and the inner-workings of each EAP type used with wireless LANs today, along with every class and type of WLAN security solution available on the market - from wireless intrusion prevention systems to wireless network management systems.

Students who complete this training class will be exposed to the necessary skills for implementing and managing wireless security in an enterprise environment.

Some Main Areas Covered by CWSP:
- WLAN Discovery Techniques
- Intrusion and Attack Techniques
- WIPS Implementation
- Network Security Design Models
- Managed Endpoint Security Systems

Class Details

Objectives



By the end of this training, the student should be able to:
- understand Security Policy
- describe potential Vulnerabilities, Threats, and Attacks
- explain WLAN Security Design and Architecture
- describe Security Lifecycle Management

Prerequisite Knowledge Advisory

To be successful in this class, the student should possess:
- an active Certified Wireless Network Administrator (CWNA) certification
- a thorough understanding of RF technologies
- an understanding of applications of 802.11 networks

Exam Required for CWSP Certification



Exam: CWSP-207
Exam Proctor: PearsonVUE
Recertification: 3 years

CWSP Certification Training Class Outline



Module 1: Security Fundamentals
Module 2: Wireless Security Challenges
Module 3: Security Policy
Module 4: Understanding Authentication
Module 5: Authentication and Key Management
Module 6: Encryption
Module 7: Security Design Scenarios
Module 8: Secure Roaming
Module 9: Network Monitoring
Module 10: WPA3 and OWE
Module 11: Penetration Testing Principles
Module 12: Penetration Testing Tools and Techniques

Share by: