You are on page 1of 2

TCP/IP foundation for engineers

Certified Wireless Security Professional


A 5 day Hands on training course

Description Key outcomes

A hands-on training course concentrating solely on By the end of the course delegates will be able to:
WiFi security with an emphasis on the delegates
 Demonstrate the threats to WiFi networks.
learning the necessary knowledge and skills to pass the
CWSP exam. The course progresses from simple  Secure WiFi networks.
authentication, encryption and key management onto in
 Configure:
depth coverage of 802.X and EAP along with many
other security solutions such as access control, WPA2
intrusion prevention and secure roaming. RADIUS
802.1x

 Pass the CWSP exam.

Training approach Details

This structured course uses Instructor Led Training to Who will benefit?
provide the best possible learning experience. Small Technical network staff.
class sizes ensure students benefit from our engaging Technical security staff.
and interactive style of teaching with delegates
Prerequisites
encouraged to ask questions throughout the course.
Introduction to data communications & networking.
Quizzes follow each major section allowing checking of
learning. Hands on sessions are used throughout to Duration: 5 days
allow delegates to consolidate their new skills.
Customer rating:

Generic training Small class sizes Hands On training Our courseware Customise your course

Generic training We limit our maximum The majority of our We write our own Please contact us if you
compliments product class size to 8 delegates; courses use hands on courses; courseware would like a course to be
specific courses covering often we have less than sessions to reinforce does not just consist of customised to meet your
the complete picture of this. This ensures optimal the theory. slides and our slides are specific requirements.
all relevant devices interactivity between diagrams not bullet point Have the course your
including the protocols delegates and instructor. text. way.
“on the wire”.
“Friendly environment “Excellent course. The “Not many courses “Comprehensive “I was very impressed by
with expert teaching that small class size was a have practice added to materials that made the the combination of
teaches the why before great benefit...” it. Normally just the course easy to follow practical and theory.
the how.” M.B. IBM theoretical stuff is and will be used as a Very informative.
G.C. Fasthosts covered.” reference point.” Friendly approachable
J.W. Vodafone V.B. Rockwell Collins environment, lots of
hands on.”
S.R. Qinetiq

www.snt.co.uk Page 1/2 Speak with our team now +44 (0)1737 821590
Certified Wireless Security Professional

Course content

WLAN Security overview WLAN security infrastructure


Standards, security basics, AAA, 802.11 security DS, Autonomous APs, WLAN controllers, split
history. Hands on: WLAN connectivity. MAC, mesh, bridging, location based access
control. Resilience. Wireless network
management system. RADIUS/LDAP servers,
Legacy 802.11 security PKI, RBAC. Hands on: 802.1X/EAP
Authentication: Open system, shared key. WEP. configuration. RADIUS configuration.
VPNs. MAC filters. SSID segmentation, SSID
802.11 Fast secure roaming
cloaking. Hands on: Analysing 802.11 frame
History, RSNA, OKC, Fast BSS transition,
exchanges, viewing hidden SSIDs.
802.11k. Hands on: Roaming.

Encryption
Wireless security risks
Basics, AES, TKIP, CCMP, WPA, WPA2. Hands
Rogue devices, rogue prevention.
on: Decrypting 802.11 data frames.
Eavesdropping, DOS attacks. Public access and
hotspots. Hands on: Backtrack.
802.11 layer 2 authentication
802.1X: Supplicant, Authenticator, Authentication
WiFi security auditing
server. Credentials. Legacy authentication. EAP,
Layer 1 audit, layer 2 audit, pen testing. WLAN
Weak EAP protocols, Strong EAP protocols: EAP
security auditing tools.
-PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands
on: Analysing 802.1X/EAP frames.
WiFi security monitoring
Wireless Intrusion Detection and Prevention
802.11 layer 2 dynamic key generation
Systems. Device classification, WIDS/WIPS
Robust Security Network. Hands on:
analysis. Monitoring. 802.11w. Hands on: Laptop
Authentication and key management.
spectrum analysers.

SOHO 802.11 security


VPNs, remote access, guest access
WPA/WPA2 personal, Preshared Keys, WiFi
Role of VPNs in 802.11, remote access,
Protected Setup (WPS). Hands on: PSK
hotspots, captive portal.
mapping.

Wireless security policies


General policy, functional policy,
recommendations.

Step back Step forward

Advanced TCP/IP
Certified Wireless Network Certified Wireless
Administrator Security Professional
Total RADIUS for
engineers

www.snt.co.uk Page 2/2 Speak with our team now +44 (0)1737 821590

You might also like