fbpx
4.66 out of 5
4.66
39 reviews on Udemy

Certified Wireless Security Professional (CWSP)

Certified Wireless Security Professional (CWSP)
Instructor:
Stone River eLearning
5,190 students enrolled
English [Auto-generated]
Understand the WLAN security technology and solutions
Learn to implement WLAN security policies and auditing practices
Explore layer vulnerabilities
Secure WLAN mobile endpoints
Learn about authentication techniques such as WPA/WPA2 Personal and Enterprise
Efficiently manage and operate WLAN
Understand the IEEE 802.11 Authentication and Key Management (AKM)

The Certified Wireless Security Professional (CWSP) course is designed on the CWSP certification exam curriculum recommended by CWNP. The course teaches the latest enterprise wireless LAN security and auditing techniques to the students. The course also covers the most up-to-date WLAN intrusion and DoS tools and techniques. The students are enabled on the functionality of the 802.11i amendment to the 802.11 standard, the inner-workings of each authentication method used with wireless LANs, and every class and type of WLAN security solution available. This includes a detailed coverage of the wireless intrusion prevention systems and wireless network management systems.

The Certified Wireless Security Professional (CWSP) course will help the students to acquire the necessary skills for implementing and managing wireless security in the enterprise by creating layer2 and layer3 hardware and software solutions with tools from the industry’s leading manufacturers. The course also serves as an excellent preparatory course for the CWSP certification offered by CWNP.

Course Introduction

1
Introduction
2
Course Introduction
3
Instructor Introduction

Module 01 - WLAN Security Overview

1
WLAN Security Overview

Download files here

2
Where We Came From
3
Standards Organizations
4
ISO and the OSI
5
ISOC Hierarchy
6
Wi-Fi Alliance Standards
7
802.11 Networking Basics Part1
8
802.11 Networking Basics Part2
9
Connection Types
10
802.11 Security Basics
11
Data Privacy Part1
12
Data Privacy Part2
13
AAA
14
Segmentation
15
Monitoring
16
Policy
17
Security History
18
802.11i and WPA Part1
19
802.11i and WPA Part2
20
802.11i and WPA Part3
21
RSN (Robust Security Network)
22
Future of 802.11 Security Part1
23
Future of 802.11 Security Part2
24
Demo - Networking Basics
25
Demo - Web GUI Introduction
26
Demo - Security Options
27
Module 01 Review
28
Module 01 - Quiz

Module 02 - Legacy Security

1
Legacy Security

Download files here

2
Authentication
3
Open System Authentication
4
WEP Encryption
5
Shared Key Authentication
6
More About WEP Part1
7
More About WEP Part2
8
Attacks Against WEP
9
VPNs Part1
10
VPNs Part2
11
VPN Tunneling Protocols
12
MAC Filters
13
SSID Segmentation
14
SSID Cloaking
15
Demo - Security Associations
16
Demo - Security Associations Part A
17
Demo - Security Associations Part B
18
Demo - MAC Spoofing
19
Module 02 Review
20
Module 02 - Quiz

Module 03 - Encryption Ciphers and Methods

1
Encryption Ciphers and Methods

Download files here

2
Encryption Basics
3
Stream and Block Ciphers
4
WLAN Encryption Methods
5
WEP Again
6
TKIP Part1
7
TKIP Part2
8
MIC
9
TKIP MPDU
10
CCMP Part1
11
CCMP Part2
12
CCMP Part3
13
CCMP Part4
14
CCMP Part5
15
WPA/WPA2
16
Proprietary Solutions
17
Demo - Encryption Example
18
Module 03 Review
19
Module 03 - Quiz

Module 04 - 802.11 Authentication Methods

1
802.11 Authentication Methods

Download files here

2
WLAN Authentication Overview
3
AAA
4
Authentication
5
Authorization
6
Accounting
7
802.1X
8
Supplicant Credentials
9
Authentication Server Credentials
10
EAP
11
EAP Process
12
Legacy EAP
13
Strong EAP Protocols
14
PACs
15
Demo - Certificate Authority Server Credentials
16
Module 04 Review
17
Module 04 - Quiz

Module 05 - Dynamic Encryption Key Generation

1
Dynamic Encryption Key Generation

Download files here

2
Dynamic WEP
3
RSN
4
Management Frames & RSNIE (eNotes)
5
RSN (Cont.)
6
Authentication and Key Management (AKM) Part1
7
Authentication and Key Management (AKM) Part2
You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don`t have an internet connection, some instructors also let their students download course lectures. That`s up to the instructor though, so make sure you get on their good side!
4.7
4.7 out of 5
39 Ratings

Detailed Rating

Stars 5
22
Stars 4
13
Stars 3
4
Stars 2
0
Stars 1
0