• Skip to primary navigation
  • Skip to main content
  • Skip to footer
NCTI

NCTI

Powers frontline performance

  • Content Solutions
    • NCTI Courses
      • All Technical
        • 5G & Wireless
      • Customer Care
      • Leadership
      • General Education
    • Custom Content
    • Learning Delivery
  • Certifications
    • Master Technician
    • Master Representative
    • Emerging Leader
    • Master Dispatcher
    • Telecom Specialist
  • College Program
    • Broadband Technology
    • Customer Care
    • Broadband Leadership
  • Hall of Fame
  • About
    • Our Team
    • News & Announcements
  • Support
    • Contact
    • Ask an Instructor
    • FAQs
    • Resources
  • Login

Certified Wireless Security Professional (CWSP)

Delivery: Seminar

Estimated Length: 32 seat hours

Price: $3,195.00

Please call to enroll: 866.575.7206

Using the latest enterprise wireless LAN security and auditing equipment in this handson course, learn, in detail, the most up-to-date WLAN intrusion and DoS tools and techniques. You will learn about functionality of the 802.11i amendment to the 802.11 standard, the inner-workings of each EAP type used with wireless LANs today and every class and type of WLAN security solution available on the market from wireless intrusion prevention systems to wireless network management systems. As an added bonus, you will receive a free exam voucher.

Delivery Options:

Please contact NCTI Customer Care for delivery options and/or available dates, locations and times. You must provide your own laptop.

Completion Time:

The estimated completion time for this course is 32 hours (four days).

Recommended Prerequisite:

  • Certified Wireless Network Administrator (CWNA)

Upon completing this course, students will be able to:

  1. understand WLAN security technology and solutions
  2. describe WLAN security policy, concerns and auditing practices
  3. layer vulnerabilities and analysis
  4. explain WLAN mobile endpoint security solutions
  5. understand WPA/WPA2 Personal and Enterprise configurations
  6. describe WLAN management and monitoring
  7. explain IEEE 802.11 authentication and key management (AKM)

Outline:

Security Fundamentals
Security basics, CWNA security review, industry organizations, terminology and wireless vulnerabilities
Wireless Security Challenges
Network discovery, pseudo-security, legacy security mechanisms, network attacks and recommended practices
Security Policy
Defining security policies, policy enforcement, policy management and policy types
Understanding Authentication
Passphrase authentication, AAA, RBAC, RADIUS, 802.1X and EAP
Authentication and Key Management
Robust security networks (RSN), RSN information element, RSN authentication and key management (AKM)
Encryption
Encryption fundamentals, encryption algorithms, WEP, TKIP and CCMP
Security Design Scenarios
Virtual private networks (VPN), remote networking and guest access networks
Secure Roaming
Roaming basics and terminology, preauthentication, PMK caching, opportunistic key caching (OKC), 802.11r FT, proprietary roaming and voice enterprise
Network Monitoring
Wireless intrusion prevention systems (WIPS), WIPS deployment models, WIPS policy, threat mitigation, location services, WNMS, protocol analysis and spectrum analysis

 

Footer

Follow Us on Social Media!

  • Email
  • Facebook
  • LinkedIn
  • Twitter
  • YouTube

Can’t Find It?

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

 

©2023 Jones/NCTI®, Inc.
All rights reserved.

Terms of Use | Privacy Policy

 

6855 South Havana Street, Suite 300,
Centennial, CO 80112 USA