CWSP Certification Training Course
Video training course for the Certified Wireless Security Professional (CWSP) certification exam.
Learn how to assess the vulnerability of a wireless network and help prevent attacks before they happen. Learn how to perform WLAN security audits and implement compliance monitoring solutions. Understand how to set up a Wireless Intrusion Prevention Systems (WIPS).
Today’s wireless network security professionals need to have a deep understanding of the latest software, tools, trends and technologies available. Security professionals are often counted on to advise on security policies (i.e. password and acceptable use). Plus, these experts are responsible for configuring an entire networks Security Design and Architecture.
- CWSP-206 – Certified Wireless Security Professional
You must pass the CWNA exam before you attempt the CWSP.
Careers you can consider after passing the Certified Wireless Security Professional exam include:
- Wireless security consultant
- Network security engineer
- Cyber Ops engineer
- Network designer (network security)
- Systems administrator
- Penetration Tester
Your CWSP Instructor
Waqas Qamar
Waqas has over eight years of experience as an IT specialist and is a technical architect team lead for Accenture. He is a Microsoft Certified IT Professional, CCNP, CCNA (wireless), Aruba Wireless (ACMA), JNCIA (Juniper), ITIL certified. He holds a Master of Science (M.S.) in Network Systems.
- Over 6.5 hours of video training
- Instructor guided lab
- End-of-module exams
- End-of-course certificate
- Access to members only forum
- Exam vendor – Pearson Vue
- CWSP Vendor Info Page
- Prerequisites – CWNA
- Recommended – PenTest+, Network+, Security+
Module 1 | WLAN Security Policies |
---|---|
Unit 1 | Welcome |
Unit 2 | WLAN Security Policies Part 1 |
Unit 3 | WLAN Security Policies Part 2 |
Module 2 | WLAN Vulnerabilities |
Unit 1 | WLAN Vulnerabilities, Threats and Attacks |
Unit 2 | WLAN Vulnerabilities, Threats and Attacks 2 |
Unit 3 | Penetration Testing and Risk Analysis |
Unit 4 | Penetration Testing and Risk Analysis 2 |
Unit 5 | WLAN Monitoring |
Unit 6 | WLAN Monitoring 2 |
Module 3 | WLAN Security |
Unit 1 | WLAN Authentication Solutions |
Unit 2 | WLAN Authentication Solutions 2 |
Unit 3 | WLAN Encryption Solutions |
Unit 4 | WLAN Encryption Solutions 2 |
Unit 5 | 802.11 Authentication and Key Management |
Unit 6 | 802.11 Authentication and Key Management 2 |
Unit 7 | Authentication and Security Services |
Unit 8 | Secure Roaming Solutions |
Unit 9 | Secure Roaming Solutions |
Unit 10 | Common Vulnerabilities and Preventive Measures |
Module 4 | Security Lifecycle Management |
Unit 1 | Security Lifecycle Management |
Unit 2 | Security Lifecycle Management 2 |
Module 5 | Labs |
Unit 1 | Kali Linux Installation and Basic Commands |
Unit 2 | Deauthentication DoS Attack |
Unit 3 | WPA-PSK Attack |
Module 6 | Exams |
Unit 1 | Exam 1 |
Unit 2 | Exam 2 |