HOME > IT & Software > Certified Wireless Security Professional (CWSP)

Certified Wireless Security Professional (CWSP)

SynopsisCertified Wireless Security Professional (CWSP , available at...
Certified Wireless Security Professional (CWSP)  No.1

Certified Wireless Security Professional (CWSP), available at $59.99, has an average rating of 4.8, with 214 lectures, 13 quizzes, based on 340 reviews, and has 3015 subscribers.

You will learn about Understand the WLAN security technology and solutions Learn to implement WLAN security policies and auditing practices Explore layer vulnerabilities Secure WLAN mobile endpoints Learn about authentication techniques such as WPA/WPA2 Personal and Enterprise Efficiently manage and operate WLAN Understand the IEEE 802.11 Authentication and Key Management (AKM) This course is ideal for individuals who are The course is intended for the professionals working with the wireless network and looking to enhance their knowledge by learning the cutting-edge wireless security tools and techniques and earn the CWSP certification by CWNP. It is particularly useful for The course is intended for the professionals working with the wireless network and looking to enhance their knowledge by learning the cutting-edge wireless security tools and techniques and earn the CWSP certification by CWNP.

Enroll now: Certified Wireless Security Professional (CWSP)

Summary

Title: Certified Wireless Security Professional (CWSP)

Price: $59.99

Average Rating: 4.8

Number of Lectures: 214

Number of Quizzes: 13

Number of Published Lectures: 214

Number of Published Quizzes: 13

Number of Curriculum Items: 227

Number of Published Curriculum Objects: 227

Original Price: $199.99

Quality Status: approved

Status: Live

What You Will Learn

  • Understand the WLAN security technology and solutions
  • Learn to implement WLAN security policies and auditing practices
  • Explore layer vulnerabilities
  • Secure WLAN mobile endpoints
  • Learn about authentication techniques such as WPA/WPA2 Personal and Enterprise
  • Efficiently manage and operate WLAN
  • Understand the IEEE 802.11 Authentication and Key Management (AKM)
  • Who Should Attend

  • The course is intended for the professionals working with the wireless network and looking to enhance their knowledge by learning the cutting-edge wireless security tools and techniques and earn the CWSP certification by CWNP.
  • Target Audiences

  • The course is intended for the professionals working with the wireless network and looking to enhance their knowledge by learning the cutting-edge wireless security tools and techniques and earn the CWSP certification by CWNP.
  • The Certified Wireless Security Professional (CWSP) course is designed on the CWSP certification exam curriculum recommended by CWNP. The course teaches the latest enterprise wireless LAN security and auditing techniques to the students. The course also covers the most up-to-date WLAN intrusion and DoS tools and techniques. The students are enabled on the functionality of the 802.11i amendment to the 802.11 standard, the inner-workings of each authentication method used with wireless LANs, and every class and type of WLAN security solution available. This includes a detailed coverage of the wireless intrusion prevention systems and wireless network management systems.

    The Certified Wireless Security Professional (CWSP) course will help the students to acquire the necessary skills for implementing and managing wireless security in the enterprise by creating layer2 and layer3 hardware and software solutions with tools from the industry’s leading manufacturers. The course also serves as an excellent preparatory course for the CWSP certification offered by CWNP.

    Course Curriculum

    Chapter 1: Course Introduction

    Lecture 1: Introduction

    Lecture 2: Course Introduction

    Lecture 3: Instructor Introduction

    Chapter 2: Module 01 – WLAN Security Overview

    Lecture 1: WLAN Security Overview

    Lecture 2: Where We Came From

    Lecture 3: Standards Organizations

    Lecture 4: ISO and the OSI

    Lecture 5: ISOC Hierarchy

    Lecture 6: Wi-Fi Alliance Standards

    Lecture 7: 802.11 Networking Basics Part1

    Lecture 8: 802.11 Networking Basics Part2

    Lecture 9: Connection Types

    Lecture 10: 802.11 Security Basics

    Lecture 11: Data Privacy Part1

    Lecture 12: Data Privacy Part2

    Lecture 13: AAA

    Lecture 14: Segmentation

    Lecture 15: Monitoring

    Lecture 16: Policy

    Lecture 17: Security History

    Lecture 18: 802.11i and WPA Part1

    Lecture 19: 802.11i and WPA Part2

    Lecture 20: 802.11i and WPA Part3

    Lecture 21: RSN (Robust Security Network)

    Lecture 22: Future of 802.11 Security Part1

    Lecture 23: Future of 802.11 Security Part2

    Lecture 24: Demo – Networking Basics

    Lecture 25: Demo – Web GUI Introduction

    Lecture 26: Demo – Security Options

    Lecture 27: Module 01 Review

    Chapter 3: Module 02 – Legacy Security

    Lecture 1: Legacy Security

    Lecture 2: Authentication

    Lecture 3: Open System Authentication

    Lecture 4: WEP Encryption

    Lecture 5: Shared Key Authentication

    Lecture 6: More About WEP Part1

    Lecture 7: More About WEP Part2

    Lecture 8: Attacks Against WEP

    Lecture 9: VPNs Part1

    Lecture 10: VPNs Part2

    Lecture 11: VPN Tunneling Protocols

    Lecture 12: MAC Filters

    Lecture 13: SSID Segmentation

    Lecture 14: SSID Cloaking

    Lecture 15: Demo – Security Associations

    Lecture 16: Demo – Security Associations Part A

    Lecture 17: Demo – Security Associations Part B

    Lecture 18: Demo – MAC Spoofing

    Lecture 19: Module 02 Review

    Chapter 4: Module 03 – Encryption Ciphers and Methods

    Lecture 1: Encryption Ciphers and Methods

    Lecture 2: Encryption Basics

    Lecture 3: Stream and Block Ciphers

    Lecture 4: WLAN Encryption Methods

    Lecture 5: WEP Again

    Lecture 6: TKIP Part1

    Lecture 7: TKIP Part2

    Lecture 8: MIC

    Lecture 9: TKIP MPDU

    Lecture 10: CCMP Part1

    Lecture 11: CCMP Part2

    Lecture 12: CCMP Part3

    Lecture 13: CCMP Part4

    Lecture 14: CCMP Part5

    Lecture 15: WPA/WPA2

    Lecture 16: Proprietary Solutions

    Lecture 17: Demo – Encryption Example

    Lecture 18: Module 03 Review

    Chapter 5: Module 04 – 802.11 Authentication Methods

    Lecture 1: 802.11 Authentication Methods

    Lecture 2: WLAN Authentication Overview

    Lecture 3: AAA

    Lecture 4: Authentication

    Lecture 5: Authorization

    Lecture 6: Accounting

    Lecture 7: 802.1X

    Lecture 8: Supplicant Credentials

    Lecture 9: Authentication Server Credentials

    Lecture 10: EAP

    Lecture 11: EAP Process

    Lecture 12: Legacy EAP

    Lecture 13: Strong EAP Protocols

    Lecture 14: PACs

    Lecture 15: Demo – Certificate Authority Server Credentials

    Lecture 16: Module 04 Review

    Chapter 6: Module 05 – Dynamic Encryption Key Generation

    Lecture 1: Dynamic Encryption Key Generation

    Lecture 2: Dynamic WEP

    Lecture 3: RSN

    Lecture 4: Management Frames & RSNIE (eNotes)

    Lecture 5: RSN (Cont.)

    Lecture 6: Authentication and Key Management (AKM) Part1

    Lecture 7: Authentication and Key Management (AKM) Part2

    Instructors

  • Certified Wireless Security Professional (CWSP)  No.2
    Stone River eLearning
    Over 1,000,000 Happy Students
  • Rating Distribution

  • 1 stars: 5 votes
  • 2 stars: 4 votes
  • 3 stars: 38 votes
  • 4 stars: 132 votes
  • 5 stars: 161 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!