CWSP: Certified Wireless Security Professional | IT Training & Certification | Info Trek
Respect Your Dreams
Follow through on your goals with courses

CWSP: Certified Wireless Security Professional


Format What’s this?
  1. 3 Days
  1. All of our private classes are customized to your organization's needs.
  2. Click on the button below to send us your details and you will be contacted shortly.
Request more information

Inquiry for: Myself    My Company

By providing your contact details, you agree to our Privacy Policy




Thank You

Our learning consultant will get back to you in 1 business day

CWSP: Certified Wireless Security Professional


CWSP Certification

CWSP certification is a professional-level wireless LAN certification. Achieving CWSP certification confirms that you have the skills to successfully secure enterprise Wi-Fi networks from hackers, no matter which brand of Wi-Fi gear your organization deploys.

You Will Cover

  • WLAN discovery techniques
  • Intrusion and attack techniques
  • 802.11 protocol analysis
  • Wireless Intrusion Prevention Systems (WIPS) implementation
  • Layer 2 and 3 VPNs used over 802.11 networks
  • Enterprise/SMB/SOHO/public network security design models
  • Managed endpoint security systems
  • 802.11 authentication and key management protocols
  • Enterprise/SMB/SOHO/public network security solution implementation
  • Building robust security networks from the ground up
  • Fast BSS transition (aka. fast/secure roaming) techniques
  • Thorough coverage of all 802.1X/EAP types used in WLANs
  • Wireless LAN management systems
  • Authentication infrastructure design models
  • Using secure applications
  • 802.11 design architectures
  • Implementing a thorough wireless security policy


This course is specially design for Administrators: network, systems, infrastructure, security, and LAN/WLANs; Support professionals: technical assistance and field support; Designers: network, systems, and infrastructure; Developers: wireless software and hardware products; Consultants and integrators: IT and security; Decision makers: infrastructure managers, IT managers, security directors, chief security officers, and chief technology officers


Suggested Prerequisites:

  • TCP/IP Networking
  • Preferred attended a CWNA training


This program will be conducted with interactive lectures, PowerPoint presentations, discussions and practical exercises


Upon completion of this program, participants should be able to :

  • Wireless Network Attacks and Threat Assessment
  • Demonstrate how to recognize, perform, and prevent the following types of attacks, and discuss their impact on the organization:
  • Information theft and placement
  • Physical device damage or theft
  • PHY and MAC Denial of Service (DoS)
  • Client hijacking, phishing, and other peer-to-peer attacks
  • Protocol analysis (eavesdropping)
  • MAC layer protocol attacks
  • Social engineering
  • Man-in-the-middle
  • Authentication and encryption cracking
  • Management interface exploits
  • Rogue infrastructure hardware placement

Understand the probability of, demonstrate the methodology of, and execute the preventative measures against the following attacks on wireless infrastructure devices:

  • Weak/default passwords on wireless infrastructure equipment
  • Misconfiguration of wireless infrastructure devices by administrative staff

Explain and demonstrate the use of protocol analyzers to capture the following sensitive information: Usernames / Passwords / SNMP Community Strings / X.509 certificates

  • Encryption keys / Passphrases
  • MAC addresses / IP addresses
  • Unencrypted data

Explain and/or demonstrate security protocol circumvention against the following types of authentication and/or encryption:

  • WEP (Any key length)
  • Shared Key Authentication
  • WPA-Personal / WPA2-Personal
  • LEAP
  • PPTP

Perform a risk assessment for a WLAN, including:

  • Asset risk
  • Legal implications
  • Regulatory compliance

Explain and demonstrate the following security vulnerabilities associated with public access or other unsecured wireless networks:

  • Spamming through the WLAN
  • Malware (viruses / spyware / adware / remote control)
  • Direct Internet attacks through the WLAN
  • Placement of illegal content
  • Information theft
  • Peer-to-peer attack

Monitoring, Management, and Tracking

Understand how to use laptop-based protocol and spectrum analyzers to effectively troubleshoot and secure wireless networks.

Describe the use, configuration, and components of an 802.11 Wireless Intrusion Prevention Systems (WIPS): WIPS server software or appliance

  • Dedicated sensor hardware/software
  • Access points as part-time sensors
  • Access points with dedicated sensor radios
  • Integration between WLAN controller and WIPS server
  • Deployment strategies: overlay and integrated
  • Performance and security analysis
  • Protocol and spectrum analysis

Explain 802.11 WIPS baselining and demonstrate the following tasks:

  • Measuring performance parameters under normal network conditions
  • Understand common reasons for false positives and false negatives
  • Configuring the WIPS to recognize all APs and client stations in the area as authorized, external, or rogue

Describe and understand common security features of 802.11 WIPS:

  • Device detection, classification, and behavior analysis
  • Rogue Triangulation, RF Fingerprinting, and Time Difference of Arrival (TDoA) techniques for real-time device and
  • interference tracking
  • Event alerting, notification, and categorization
  • Policy enforcement and violation reporting
  • Wired/Wireless intrusion mitigation
  • Protocol analysis with filtering
  • Rogue containment and remediation
  • Data forensics

Describe and demonstrate the different types of WLAN management systems and their features:

  • Network discovery
  • Configuration and firmware management
  • Audit management and policy enforcement
  • Network and user monitoring
  • Rogue detection
  • Event alarms and notification

Describe and implement compliance monitoring, enforcement, and reporting

  • Industry requirements (PCI)
  • Government regulations

Security Design and Architecture

Describe wireless network security models

  • Hotspot / Public Access / Guest Access
  • Small Office / Home Office
  • Small and Medium Enterprise
  • Large Enterprise
  • Remote Access: Mobile User and Branch Office

Recognize and understand the following security concepts:

  • 802.11 Authentication and Key Management (AKM) components and processes
  • Robust Security Networks (RSN) and RSN Associations (RSNA)
  • Pre-RSNA Security
  • Transition Security Networks (TSN)
  • RSN Information Elements
  • How WPA and WPA2 certifications relate to 802.11 standard terminology and technology
  • Functional parts of TKIP and its differences from WEP
  • The role of TKIP/RC4 in WPA implementations
  • The role of CCMP/AES in WPA2 implementations
  • TKIP compatibility between WPA and WPA2 implementations
  • Appropriate use and configuration of WPA-Personal and WPA-Enterprise
  • Appropriate use and configuration of WPA2-Personal and WPA2-Enterprise
  • Appropriate use and configuration of Per-user Pre-shared Key (PPSK)
  • Feasibility of WPA-Personal and WPA2-Personal exploitation

Identify the purpose and characteristics of 802.1X and EAP:

  • Supplicant, authenticator, and authentication server roles
  • Functions of the authentication framework and controlled/uncontrolled ports
  • How EAP is used with 802.1X port-based access control for authentication
  • Strong EAP types used with 802.11 WLANs:

Recognize and understand the common uses of VPNs in wireless networks, including:

  • Remote AP
  • VPN client software
  • WLAN Controllers

Describe, demonstrate, and configure centrally-managed client-side security applications:

  • VPN policies
  • Personal firewall software
  • Wireless client utility software

Describe and demonstrate the use of secure infrastructure management protocols:

  • SNMPv3
  • SCP
  • SSH2

Explain the role, importance, and limiting factors of VLANs and network segmentation in an 802.11 WLAN infrastructure.

Describe, configure, and deploy a AAA server and explain the following concepts related to AAA servers:

  • RADIUS server
  • Integrated RADIUS services within WLAN infrastructure devices
  • RADIUS deployment strategies
  • RADIUS proxy services
  • LDAP Directory Services integration deployment strategies
  • EAP support for 802.11 networks
  • Applying user and AAA server credential types (Usernames/Passwords, X.509 Certificates, Protected Access Credentials (PACs), & Biometrics)
  • The role of AAA services in wireless client VLAN assignments
  • Benefits of mutual authentication between supplicant and authentication server

Explain frame exchange processes and the purpose of each encryption key within 802.11 Authentication and Key Management, including:

  • Master Session Key (MSK) generation
  • PMK generation and distribution
  • GMK generation
  • PTK / GTK generation & distribution
  • 4-Way Handshake
  • Group Handshake
  • Passphrase-to-PSK mapping

Describe and configure major security features in WLAN infrastructure devices:

  • Role Based Access Control (RBAC) (per-user or per-group)
  • Location Based Access Control (LBAC)
  • Fast BSS transition in an RSN
  • 802.1Q VLANs and trunking on Ethernet switches and WLAN infrastructure devices
  • Hot standby/failover and clustering support
  • WPA/WPA2 Personal and Enterprise
  • Secure management interfaces (HTTPS, SNMPv3, SSH2)
  • Intrusion detection and prevention
  • Remote access (branch office and mobile users)

Explain the benefits of and configure management frame protection (802.11w) in access points and WLAN controllers.

Explain the purpose, methodology, features, and configuration of guest access networks, including:

  • Segmentation
  • Captive Portal (Web) Authentication • User-based authentication methods

Security Policy

  • Explain the purpose and goals of the following WLAN security policies:
  • Password policy
  • End-user and administrator training on security solution use and social engineering mitigation
  • Internal marketing campaigns to heighten security awareness
  • Periodic network security audits
  • Acceptable network use & abuse policy
  • Use of Role Based Access Control (RBAC) and traffic filtering
  • Obtaining the latest security feature sets through firmware and software upgrades
  • Consistent implementation procedure
  • Centralized implementation and management guidelines and procedures
  • Inclusion in asset and change management programs

Describe appropriate installation locations for and remote connectivity to WLAN devices in order to avoid physical theft, tampering, and data theft. Considering the following:

  • Physical security implications of infrastructure device placement
  • Secure remote connections to WLAN infrastructure devices

Explain the importance and implementation of client-side security applications:

  • VPN client software and policies
  • Personal firewall software
  • 802.1X/EAP supplicant software

Explain the importance of on-going WLAN monitoring and documentation:

  • Explain the necessary hardware and software for on-going WLAN security monitoring
  • Describe and implement WLAN security audits and compliance reports

Summarize the security policy criteria related to wireless public access network use.

  • User risks related to unsecured access
  • Provider liability, disclaimers, and acceptable use notifications

Explain the importance and implementation of a scalable and secure WLAN solution that includes the following security parameters:

  • Intrusion detection and prevention
  • Role Based Access Control (RBAC) and traffic filtering
  • Strong authentication and encryption

Fast BSS transition

Fast Secure Roaming

Describe and implement 802.11 Authentication and Key Management (AKM) including the following:


PMK Caching

Describe and implement Opportunistic Key Caching (OKC) and explain its enhancements beyond 802.11 AKM.

Describe and implement 802.11r Authentication and Key Management (AKM) and compare and contrast 802.11r enhancements with 802.11 AKM and Opportunistic Key Caching.

  • Fast BSS Transition (FT) Key Architecture
  • Key Nomenclature
  • Initial Mobility Domain Association
  • Over-the-Air Transition
  • Over-the-DS Transition

Describe applications of Fast BSS transition.

Describe and implement non-traditional roaming mechanisms.

  • Single Channel Architecture (SCA) WLAN controllers with controller-based APs
  • Infrastructure-controlled handoff

Describe how 802.11k Radio Resource Measurement factors into fast BSS transition.

  • Neighbor Reports
  • Contrasting SCA and MCA Architectures

Describe the importance, application, and functionality of Wi-Fi Voice-Personal product certification

Expand All


Introduction To Wireless Security
  • Security Basics
  • CWNA Security Review
  • Industry Organisations
  • Terminology
  • Wireless Vulnerabilities
Legacy Security And Network Attacks
  • Network Discovery
  • Pseudo Security
  • Legacy Security Mechanisms
  • Network Attacks
  • Recommended Practices
Security Policy
  • Legal Considerations
  • General Security Policy
  • Functional Security Policy
  • Network Audits and Penetration Testing
  • Passphrase Authentication
  • AAA
  • RBAC
  • 802.1X
  • EAP
RSN Authentication And Key Management (AKM)
  • Robust Security Networks
  • RSN Information Element
  • RSN Authentication and Key Management (AKM)
  • Encryption Fundamentals
  • Encryption Algorithms
  • WEP
  • TKIP
  • CCMP
Remote Networking & Public Access
  • Virtual Private Networks
  • Remote Networking
  • Guest Access Networks

Fast Bss Transition
  • Roaming Basics and Terminology
  • Preauthentication
  • PMK Caching
  • Opportunistic Key Caching (OKC)
  • 802.11r FT
  • Proprietary Roaming
  • Voice Enterprise
Network Monitoring, Intrusion Prevention And Analysis
  • Wireless Intrusion Prevention Systems (WIPS)
  • WIPS Deployment Models
  • WIPS Policy
  • Threat Mitigation
  • Location Services
  • WNMS
  • Protocol Analysis
  • Spectrum Analysis

  • Basic PSK Security
  • RADIUS & 802.1X/EAP
  • Users, Groups and Role Based Access Control (RBAC)
  • Guest Access and Captive Portals
  • Protocol Analysis
  • Spectrum Analysis
  • Roaming
  • WIPS
  • Network Attacks

CWNP Certified Trainer

CWNP Certified Trainer

Read More

Course Reviews

No Remarks


0 Ratings