Eight-O-Two Technology Solutions 719-325-7560

888-802-4802

Home   Services Training Contact Us
 
 

Enterprise Wi-Fi Security

Associated Certification: Certified Wireless Security Professional (CWSP)

VUE Certification Exam CWSP-206

Course Summary

Duration: 3 days, Classroom or Virtual Live Online

Audience: Network Administrators, Consultants, and Architects

Prerequisites: Basic networking knowledge (OSI / IP). Basic network security concepts and wireless network administration CWNA or equivalent knowledge. To earn the CWSP certification, you must pass 2 exams: CWNA and CWSP.

Introduction

The Enterprise Wi-Fi Security  course provides the wireless security professional a complete foundation of knowledge for entering into or advancing in the wireless security industry. From small/medium business (SMB) to enterprise-class wireless security, this course delivers hands-on training that will benefit the administrator as well as the security consultant.

Course Outline

Security Fundamentals
Security Basics
CWNA Security Review
Industry Organizations
Terminology
Wireless Vulnerabilities

Wireless Security Challenges
Network Discovery
Pseudo-security
Legacy Security Mechanisms
Network Attacks
Recommended Practices

Security Policy
Defining Security Policies
Policy Enforcement
Policy Management
Policy Types

Understanding Authentication
Passphrase Authentication
AAA
RBAC
RADIUS
802.1X
EAP

RSN Authentication and Key Management (AKM)
Robust Security Networks
RSN Information Element
RSN Authentication and Key Management (AKM)

Encryption
Encryption Fundamentals
Encryption Algorithms
WEP
TKIP
CCMP

Security Design Scenarios
Virtual Private Networks (VPN)
Remote Networking
Guest Access Networks

Secure Roaming
Roaming Basics and Terminology
Preauthentication
PMK Caching
Opportunistic Key Caching (OKC)
802.11r FT
Proprietary Roaming
Voice Enterprise

Network Monitoring
Wireless Intrusion Prevention Systems (WIPS)
WIPS Deployment Models
WIPS Policy
Threat Mitigation
Location Services
WNMS
Protocol Analysis
Spectrum Analysis

Copyright 2015 Eight-O-Two Technology Solutions, LLC. All rights reserved