Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Mindfulness Meditation Personal Transformation Life Purpose Emotional Intelligence Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Google Analytics
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Modeling Data Analysis Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Blogging Freelancing Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Operating Systems Certified Wireless Security Professional (CWSP)

Certified Wireless Security Professional (CWSP)

Certified Wireless Security Professional (CWSP)
Bestseller
Rating: 4.4 out of 54.4 (166 ratings)
1,860 students
Created by Stone River eLearning
Last updated 9/2018
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Understand the WLAN security technology and solutions
  • Learn to implement WLAN security policies and auditing practices
  • Explore layer vulnerabilities
  • Secure WLAN mobile endpoints
  • Learn about authentication techniques such as WPA/WPA2 Personal and Enterprise
  • Efficiently manage and operate WLAN
  • Understand the IEEE 802.11 Authentication and Key Management (AKM)
Curated for the Udemy for Business collection

Requirements

  • The students registering for this course are required to have studied the Certified Wireless Network Administrator (CWNA) course or passed the CWNA certification exam.

Description

The Certified Wireless Security Professional (CWSP) course is designed on the CWSP certification exam curriculum recommended by CWNP. The course teaches the latest enterprise wireless LAN security and auditing techniques to the students. The course also covers the most up-to-date WLAN intrusion and DoS tools and techniques. The students are enabled on the functionality of the 802.11i amendment to the 802.11 standard, the inner-workings of each authentication method used with wireless LANs, and every class and type of WLAN security solution available. This includes a detailed coverage of the wireless intrusion prevention systems and wireless network management systems.

The Certified Wireless Security Professional (CWSP) course will help the students to acquire the necessary skills for implementing and managing wireless security in the enterprise by creating layer2 and layer3 hardware and software solutions with tools from the industry’s leading manufacturers. The course also serves as an excellent preparatory course for the CWSP certification offered by CWNP.

Who this course is for:

  • The course is intended for the professionals working with the wireless network and looking to enhance their knowledge by learning the cutting-edge wireless security tools and techniques and earn the CWSP certification by CWNP.

Featured review

Melca Santos
Melca Santos
20 courses
3 reviews
Rating: 5.0 out of 5a year ago
This video is explaining the material better than my Wireless security professor at my college. The instructor is very clear and I am just learning and remembering the material which is great!. Thank god for the visuals too.

Course content

14 sections • 214 lectures • 13h 17m total length

  • Preview00:10
  • Course Introduction
    01:35
  • Instructor Introduction
    01:42

  • WLAN Security Overview
    01:40
  • Where We Came From
    02:26
  • Standards Organizations
    01:31
  • ISO and the OSI
    10:25
  • ISOC Hierarchy
    03:00
  • Wi-Fi Alliance Standards
    07:02
  • 802.11 Networking Basics Part1
    01:27
  • 802.11 Networking Basics Part2
    02:43
  • Connection Types
    02:08
  • 802.11 Security Basics
    01:54
  • Data Privacy Part1
    01:47
  • Preview03:14
  • AAA
    01:33
  • Segmentation
    03:46
  • Monitoring
    01:42
  • Policy
    01:19
  • Security History
    00:51
  • 802.11i and WPA Part1
    00:45
  • 802.11i and WPA Part2
    01:37
  • 802.11i and WPA Part3
    02:35
  • RSN (Robust Security Network)
    00:54
  • Future of 802.11 Security Part1
    01:44
  • Future of 802.11 Security Part2
    01:30
  • Demo - Networking Basics
    04:45
  • Demo - Web GUI Introduction
    05:12
  • Preview03:13
  • Module 01 Review
    00:49
  • Module 01 - Quiz
    10 questions

  • Legacy Security
    00:48
  • Authentication
    01:00
  • Open System Authentication
    02:31
  • WEP Encryption
    04:09
  • Preview02:26
  • More About WEP Part1
    06:05
  • More About WEP Part2
    08:58
  • Attacks Against WEP
    06:19
  • VPNs Part1
    03:26
  • VPNs Part2
    06:19
  • Preview01:49
  • MAC Filters
    02:35
  • SSID Segmentation
    04:26
  • SSID Cloaking
    01:58
  • Demo - Security Associations
    09:39
  • Demo - Security Associations Part A
    04:39
  • Demo - Security Associations Part B
    05:00
  • Demo - MAC Spoofing
    06:49
  • Module 02 Review
    00:40
  • Module 02 - Quiz
    10 questions

  • Encryption Ciphers and Methods
    00:37
  • Encryption Basics
    08:18
  • Stream and Block Ciphers
    06:00
  • WLAN Encryption Methods
    03:07
  • WEP Again
    01:02
  • TKIP Part1
    06:54
  • TKIP Part2
    07:31
  • MIC
    06:59
  • TKIP MPDU
    05:02
  • Preview03:49
  • CCMP Part2
    04:07
  • CCMP Part3
    03:23
  • CCMP Part4
    02:24
  • CCMP Part5
    03:45
  • WPA/WPA2
    01:15
  • Proprietary Solutions
    00:50
  • Demo - Encryption Example
    06:27
  • Module 03 Review
    00:23
  • Module 03 - Quiz
    10 questions

  • 802.11 Authentication Methods
    00:43
  • WLAN Authentication Overview
    08:00
  • AAA
    02:35
  • Authentication
    07:11
  • Authorization
    03:20
  • Accounting
    04:45
  • 802.1X
    05:04
  • Supplicant Credentials
    07:26
  • Authentication Server Credentials
    08:02
  • EAP
    04:23
  • EAP Process
    05:50
  • Legacy EAP
    03:54
  • Strong EAP Protocols
    04:47
  • PACs
    04:45
  • Demo - Certificate Authority Server Credentials
    05:51
  • Module 04 Review
    00:41
  • Module 04 - Quiz
    10 questions

  • Dynamic Encryption Key Generation
    01:07
  • Dynamic WEP
    05:59
  • RSN
    06:44
  • Management Frames & RSNIE (eNotes)
    06:29
  • RSN (Cont.)
    01:11
  • Authentication and Key Management (AKM) Part1
    04:21
  • Authentication and Key Management (AKM) Part2
    05:14
  • Authentication and Key Management (AKM) Part3
    00:43
  • Authentication and Key Management (AKM) Part4
    02:41
  • RSNA Key Hierarchy
    02:23
  • Master Session Key (MSK)
    02:23
  • 4-Way Handshake
    03:17
  • Steps of the 4 -way Handshake
    00:51
  • Group Key Handshake
    01:06
  • PeerKey Handshake
    02:00
  • Demo - EAP
    05:35
  • Demo - Information Elements
    06:39
  • Module 05 Review
    00:56
  • Module 05 - Quiz
    10 questions

  • SOHO 802.11 Security
    00:24
  • Introduction
    04:48
  • Why a Passphrase
    07:32
  • 4-Way Handshake Again
    05:54
  • Risks of WPA/WPA2
    04:49
  • Another Risk Factor of WPA/2
    03:04
  • Wi -Fi Protected Setup (WPS) Part1
    02:32
  • Wi -Fi Protected Setup (WPS) Part2
    04:24
  • Wi -Fi Protected Setup (WPS) Part3
    00:26
  • Wi -Fi Protected Setup (WPS) Part4
    03:34
  • Wi -Fi Protected Setup (WPS) Part5
    01:01
  • Initial WLAN Setup
    01:40
  • SOHO Best Practices
    05:56
  • Demo - Cracking Hashes
    09:37
  • Module 06 Review
    00:39
  • Module 06 - Quiz
    10 questions

  • Fast Secure Roaming
    01:07
  • History of 802.11 Roaming
    04:11
  • Client Roaming Thresholds
    03:02
  • AP to AP Handoff (e -notes
    09:10
  • Re -Association
    02:01
  • Types of APs
    03:09
  • RSNA Review
    01:46
  • PMKSA
    07:46
  • PMK Caching
    01:58
  • Pre -authentication
    03:29
  • Opportunistic Key Caching (OKC)
    10:00
  • Proprietary FSR
    06:03
  • FT Key Hierarchy (e -notes)
    09:08
  • FT Initial Mobility Domain Association
    02:17
  • Over the Air Fast BSS Transition (e -notes)
    06:07
  • Over the Air DS Fast BSS Transition (e - notes)
    12:25
  • 802.11K -2008
    03:50
  • L3 Roaming
    10:43
  • Mobile IP
    04:46
  • Troubleshooting
    03:35
  • Voice Personal and Voice Enterprise
    04:50
  • Module 07 Review
    00:49
  • Module 07 - Quiz
    10 questions

  • Wireless Security Risks
    00:42
  • Introduction
    00:26
  • Rogue Devices Part1
    09:12
  • Rogue Devices Part2
    03:42
  • Rogue Prevention
    03:12
  • Eavesdropping
    04:41
  • Authentication Attacks
    01:16
  • DoS
    05:44
  • L2 DoS
    01:11
  • 802.11w
    00:53
  • MAC Spoofing
    01:47
  • Wireless Hijacking
    02:43
  • Peer -to -Peer Attacks
    01:49
  • Management Interface Exploits
    02:42
  • Physical Damage and Theft
    00:40
  • Social Engineering
    00:46
  • Public Access and WLAN Hotspots
    00:38
  • Demo - Rogue Devices
    04:26
  • Demo - Public Hotspots
    06:32
  • Module 08 Review
    00:30
  • Module 08 - Quiz
    10 questions

  • Wireless LAN Security Auditing
    00:19
  • Purpose of Auditing
    01:26
  • WLAN Audits Part1
    01:52
  • WLAN Audits Part2
    00:46
  • Layer 1 Audit
    05:13
  • Layer 2 Audit
    02:13
  • Penetration Testing
    03:57
  • Wired Infrastructure Audit
    03:07
  • Social Engineering
    01:47
  • WIPS Audit
    00:52
  • Documenting the Audit
    04:10
  • Recommendations
    00:43
  • WLAN Security Auditing Tools
    01:32
  • Module 09 Review
    00:23
  • Module 09 - Quiz
    10 questions

Instructor

Stone River eLearning
500,000+ Happy Udemy Students
Stone River eLearning
  • 4.2 Instructor Rating
  • 52,723 Reviews
  • 668,212 Students
  • 307 Courses

At Stone River eLearning, technology is all we teach. If you're interested in IT, programming, development or design - we have it covered. 

Check out our huge catalog of courses and join the over 1,200,000+ students currently taking Stone River eLearning courses. We currently offer 800+ different technology training courses on our Stone River eLearning website and are adding new courses on hot and trending topics every month. A subscription option is available for those with a real passion for learning.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.