If you are interested in learning the most up-to-date WLAN intrusion and DoS tools and techniques, then welcome to the Certified Wireless Security Professional (CWSP).
This intensive course includes the roles and responsibilities of a Certified Wireless Security Professional. Initially, you will learn the basics of WLAN security, following with legacy security, encryption cyphers and methods, and 802.11 authentication methods. You will also enhance your knowledge about dynamic encryption key generation, SOHO 802.11 security, fast secure roaming, wireless security risks, and wireless LAN security auditing. A comprehensive study of the wireless intrusion prevention systems and wireless network management systems are also an integral component of this course.
Lastly, learn how to implement wireless security monitoring, VPNs, remote access and guest access services, the WLAN security infrastructure, WLAN security infrastructure, and wireless security policies in an approachable manner.
How is this qualification is delivered?
Our courses are taught entirely online, meaning you can access the materials wherever, whenever, at a pace that suits you, without formal deadlines or teaching schedules.
These can be accessed through any device with an internet connection. Our e-learning platform is optimised for use on mobile, tablet, laptops and desktop computers.
Certification:
Enhance your profile with a CPD-accredited certificate, available for an additional cost after course completion.
Course Curriculum
WLAN Security Overview | |||
WLAN Security Overview and Data Privacy | FREE | 00:58:00 | |
Networking Basics | FREE | 00:04:00 | |
Web GUI Introduction | 00:05:00 | ||
Security Options | 00:03:00 | ||
Legacy Security | |||
Legacy Security | 00:32:00 | ||
VPNs | 00:21:00 | ||
Security Association | 00:09:00 | ||
MAC Spoofing | 00:07:00 | ||
Encryption Ciphers and Methods | |||
Encryption Ciphers and Methods | 00:19:00 | ||
TKIP | 00:26:00 | ||
CCMP | 00:20:00 | ||
Encryption Examples | 00:06:00 | ||
802.11 Authentication Methods | |||
802.11 Authentication Methods | 00:26:00 | ||
802.1X | 00:20:00 | ||
EAP | 00:25:00 | ||
Certified Authority Server Credentials | 00:06:00 | ||
Dynamic Encryption Key Generation | |||
Dynamic Encryption Key Generation | 00:21:00 | ||
Authentication and Key Management | 00:13:00 | ||
RSNA Key Hierarchy | 00:12:00 | ||
EAP | 00:05:00 | ||
Information Elements | 00:06:00 | ||
SOHO 802.11 Security | |||
SOHO 802.11 Security | 00:26:00 | ||
Wi-Fi Protected Setup (WPS) | 00:20:00 | ||
Cracking Hashes | 00:09:00 | ||
Fast Secure Roaming | |||
Fast Secure Roaming | 00:24:00 | ||
PMKSA | 00:29:00 | ||
FT Key Hierarchy (e-notes) | 00:30:00 | ||
802.11K-2008 | 00:28:00 | ||
Wireless Security Risks | |||
Wireless Security Risks | 00:22:00 | ||
Authentication Attacks | 00:20:00 | ||
Rogue Devices | 00:04:00 | ||
Public Hotspots | 00:06:00 | ||
Wireless LAN Security Auditing | |||
Wireless LAN Security Auditing | 00:28:00 | ||
Wireless Security Monitoring | |||
Wireless Security Monitoring | 00:21:00 | ||
Device Tracking | 00:17:00 | ||
VPNs, Remote Access and Guest Access Services | |||
VPNs, Remote Access and Guest Access Services | 00:23:00 | ||
Remote Access | 00:14:00 | ||
WLAN Security Infrastructure | |||
WLAN Security Infrastructure | 00:37:00 | ||
Management Protocols | 00:23:00 | ||
Other RADIUS Solutions | 00:15:00 | ||
Wireless Security Policies | |||
Wireless Security Policies | 00:17:00 | ||
Other Policies | 00:14:00 | ||
Mock Exam | |||
Mock Exam – Certified Wireless Security Professional (CWSP) | 00:20:00 | ||
Final Exam | |||
Final Exam – Certified Wireless Security Professional (CWSP) | 00:20:00 |
Course Reviews
No Reviews found for this course.