Certified Wireless Security Professional (CWSP)
4.5 (125 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,462 students enrolled

Certified Wireless Security Professional (CWSP)

Certified Wireless Security Professional (CWSP)
Bestseller
4.5 (125 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,462 students enrolled
Last updated 9/2018
English
English [Auto]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 13.5 hours on-demand video
  • 13 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Understand the WLAN security technology and solutions
  • Learn to implement WLAN security policies and auditing practices
  • Explore layer vulnerabilities
  • Secure WLAN mobile endpoints
  • Learn about authentication techniques such as WPA/WPA2 Personal and Enterprise
  • Efficiently manage and operate WLAN
  • Understand the IEEE 802.11 Authentication and Key Management (AKM)
Requirements
  • The students registering for this course are required to have studied the Certified Wireless Network Administrator (CWNA) course or passed the CWNA certification exam.
Description

The Certified Wireless Security Professional (CWSP) course is designed on the CWSP certification exam curriculum recommended by CWNP. The course teaches the latest enterprise wireless LAN security and auditing techniques to the students. The course also covers the most up-to-date WLAN intrusion and DoS tools and techniques. The students are enabled on the functionality of the 802.11i amendment to the 802.11 standard, the inner-workings of each authentication method used with wireless LANs, and every class and type of WLAN security solution available. This includes a detailed coverage of the wireless intrusion prevention systems and wireless network management systems.

The Certified Wireless Security Professional (CWSP) course will help the students to acquire the necessary skills for implementing and managing wireless security in the enterprise by creating layer2 and layer3 hardware and software solutions with tools from the industry’s leading manufacturers. The course also serves as an excellent preparatory course for the CWSP certification offered by CWNP.

Who this course is for:
  • The course is intended for the professionals working with the wireless network and looking to enhance their knowledge by learning the cutting-edge wireless security tools and techniques and earn the CWSP certification by CWNP.
Course content
Expand all 214 lectures 13:17:12
+ Course Introduction
3 lectures 03:27
Course Introduction
01:35
Instructor Introduction
01:42
+ Module 01 - WLAN Security Overview
27 lectures 01:11:32

Download files here

WLAN Security Overview
01:40
Where We Came From
02:26
Standards Organizations
01:31
ISO and the OSI
10:25
ISOC Hierarchy
03:00
Wi-Fi Alliance Standards
07:02
802.11 Networking Basics Part1
01:27
802.11 Networking Basics Part2
02:43
Connection Types
02:08
802.11 Security Basics
01:54
Data Privacy Part1
01:47
AAA
01:33
Segmentation
03:46
Monitoring
01:42
Policy
01:19
Security History
00:51
802.11i and WPA Part1
00:45
802.11i and WPA Part2
01:37
802.11i and WPA Part3
02:35
RSN (Robust Security Network)
00:54
Future of 802.11 Security Part1
01:44
Future of 802.11 Security Part2
01:30
Demo - Networking Basics
04:45
Demo - Web GUI Introduction
05:12
Module 01 Review
00:49
Module 01 - Quiz
10 questions
+ Module 02 - Legacy Security
19 lectures 01:19:36

Download files here

Legacy Security
00:48
Authentication
01:00
Open System Authentication
02:31
WEP Encryption
04:09
More About WEP Part1
06:05
More About WEP Part2
08:58
Attacks Against WEP
06:19
VPNs Part1
03:26
VPNs Part2
06:19
MAC Filters
02:35
SSID Segmentation
04:26
SSID Cloaking
01:58
Demo - Security Associations
09:39
Demo - Security Associations Part A
04:39
Demo - Security Associations Part B
05:00
Demo - MAC Spoofing
06:49
Module 02 Review
00:40
Module 02 - Quiz
10 questions
+ Module 03 - Encryption Ciphers and Methods
18 lectures 01:11:53

Download files here

Encryption Ciphers and Methods
00:37
Encryption Basics
08:18
Stream and Block Ciphers
06:00
WLAN Encryption Methods
03:07
WEP Again
01:02
TKIP Part1
06:54
TKIP Part2
07:31
MIC
06:59
TKIP MPDU
05:02
CCMP Part2
04:07
CCMP Part3
03:23
CCMP Part4
02:24
CCMP Part5
03:45
WPA/WPA2
01:15
Proprietary Solutions
00:50
Demo - Encryption Example
06:27
Module 03 Review
00:23
Module 03 - Quiz
10 questions
+ Module 04 - 802.11 Authentication Methods
16 lectures 01:17:17

Download files here

802.11 Authentication Methods
00:43
WLAN Authentication Overview
08:00
AAA
02:35
Authentication
07:11
Authorization
03:20
Accounting
04:45
802.1X
05:04
Supplicant Credentials
07:26
Authentication Server Credentials
08:02
EAP
04:23
EAP Process
05:50
Legacy EAP
03:54
Strong EAP Protocols
04:47
PACs
04:45
Demo - Certificate Authority Server Credentials
05:51
Module 04 Review
00:41
Module 04 - Quiz
10 questions
+ Module 05 - Dynamic Encryption Key Generation
18 lectures 59:39

Download files here

Dynamic Encryption Key Generation
01:07
Dynamic WEP
05:59
RSN
06:44
Management Frames & RSNIE (eNotes)
06:29
RSN (Cont.)
01:11
Authentication and Key Management (AKM) Part1
04:21
Authentication and Key Management (AKM) Part2
05:14
Authentication and Key Management (AKM) Part3
00:43
Authentication and Key Management (AKM) Part4
02:41
RSNA Key Hierarchy
02:23
Master Session Key (MSK)
02:23
4-Way Handshake
03:17
Steps of the 4 -way Handshake
00:51
Group Key Handshake
01:06
PeerKey Handshake
02:00
Demo - EAP
05:35
Demo - Information Elements
06:39
Module 05 Review
00:56
Module 05 - Quiz
10 questions
+ Module 06 - SOHO 802.11 Security
15 lectures 56:20

Download files here

SOHO 802.11 Security
00:24
Introduction
04:48
Why a Passphrase
07:32
4-Way Handshake Again
05:54
Risks of WPA/WPA2
04:49
Another Risk Factor of WPA/2
03:04
Wi -Fi Protected Setup (WPS) Part1
02:32
Wi -Fi Protected Setup (WPS) Part2
04:24
Wi -Fi Protected Setup (WPS) Part3
00:26
Wi -Fi Protected Setup (WPS) Part4
03:34
Wi -Fi Protected Setup (WPS) Part5
01:01
Initial WLAN Setup
01:40
SOHO Best Practices
05:56
Demo - Cracking Hashes
09:37
Module 06 Review
00:39
Module 06 - Quiz
10 questions
+ Module 07 - Fast Secure Roaming
22 lectures 01:52:12

Download files here

Fast Secure Roaming
01:07
History of 802.11 Roaming
04:11
Client Roaming Thresholds
03:02
AP to AP Handoff (e -notes
09:10
Re -Association
02:01
Types of APs
03:09
RSNA Review
01:46
PMKSA
07:46
PMK Caching
01:58
Pre -authentication
03:29
Opportunistic Key Caching (OKC)
10:00
Proprietary FSR
06:03
FT Key Hierarchy (e -notes)
09:08
FT Initial Mobility Domain Association
02:17
Over the Air Fast BSS Transition (e -notes)
06:07
Over the Air DS Fast BSS Transition (e - notes)
12:25
802.11K -2008
03:50
L3 Roaming
10:43
Mobile IP
04:46
Troubleshooting
03:35
Voice Personal and Voice Enterprise
04:50
Module 07 Review
00:49
Module 07 - Quiz
10 questions
+ Module 08 - Wireless Security Risks
20 lectures 53:32

Download files here

Wireless Security Risks
00:42
Introduction
00:26
Rogue Devices Part1
09:12
Rogue Devices Part2
03:42
Rogue Prevention
03:12
Eavesdropping
04:41
Authentication Attacks
01:16
DoS
05:44
L2 DoS
01:11
802.11w
00:53
MAC Spoofing
01:47
Wireless Hijacking
02:43
Peer -to -Peer Attacks
01:49
Management Interface Exploits
02:42
Physical Damage and Theft
00:40
Social Engineering
00:46
Public Access and WLAN Hotspots
00:38
Demo - Rogue Devices
04:26
Demo - Public Hotspots
06:32
Module 08 Review
00:30
Module 08 - Quiz
10 questions
+ Module 09 - Wireless LAN Security Auditing
14 lectures 28:20

Download files here

Wireless LAN Security Auditing
00:19
Purpose of Auditing
01:26
WLAN Audits Part1
01:52
WLAN Audits Part2
00:46
Layer 1 Audit
05:13
Layer 2 Audit
02:13
Penetration Testing
03:57
Wired Infrastructure Audit
03:07
Social Engineering
01:47
WIPS Audit
00:52
Documenting the Audit
04:10
Recommendations
00:43
WLAN Security Auditing Tools
01:32
Module 09 Review
00:23
Module 09 - Quiz
10 questions