Location
-
Format
What’s this? Ways to train
Classroom
Live, instructor-led training in a standard, professional classroom environmentVirtual
Live, instructor-led training conducted over the internet, with hands-on labsOnline
An online, HTML5, self-paced learning experience available for all coursesOn-site
Private training for your entire team, delivered at your location, a training center, or onlineVideo classroom
Learn more about our training formats
High-definition video of our most popular courses, streamed to your laptop or personal device
-
3 Days
-
All of our private classes are customized to your organization's needs.
-
Click on the button below to send us your details and you will be contacted shortly.
Already purchased this offering? Log in
Request more information
Inquiry for: Myself My Company
By providing your contact details, you agree to our Privacy Policy
Thank You
Our learning consultant will get back to you in 1 business day
CWSP: Certified Wireless Security Professional
WHAT YOU WILL LEARN
CWSP Certification
CWSP certification is a professional-level
wireless LAN certification. Achieving CWSP certification confirms that you have
the skills to successfully secure enterprise Wi-Fi networks from hackers, no
matter which brand of Wi-Fi gear your organization deploys.
You Will Cover
- WLAN discovery techniques
- Intrusion and attack techniques
- 802.11 protocol analysis
- Wireless Intrusion Prevention Systems (WIPS) implementation
- Layer 2 and 3 VPNs used over 802.11 networks
- Enterprise/SMB/SOHO/public network security design models
- Managed endpoint security systems
- 802.11 authentication and key management protocols
- Enterprise/SMB/SOHO/public network security solution implementation
- Building robust security networks from the ground up
- Fast BSS transition (aka. fast/secure roaming) techniques
- Thorough coverage of all 802.1X/EAP types used in WLANs
- Wireless LAN management systems
- Authentication infrastructure design models
- Using secure applications
- 802.11 design architectures
- Implementing a thorough wireless security policy
AUDIENCE
This course is specially
design for Administrators: network, systems, infrastructure, security, and
LAN/WLANs; Support professionals: technical assistance and field support; Designers:
network, systems, and infrastructure; Developers: wireless software and
hardware products; Consultants and integrators: IT and security; Decision
makers: infrastructure managers, IT managers, security directors, chief
security officers, and chief technology officers
PREREQUISITES
Suggested Prerequisites:
- TCP/IP Networking
- Preferred attended a CWNA training
METHODOLOGY
This program will be conducted with
interactive lectures, PowerPoint presentations, discussions and practical
exercises
COURSE OBJECTIVES
Upon completion of this program,
participants should be able to :
- Wireless Network Attacks and Threat Assessment
- Demonstrate how to recognize, perform, and prevent the following types of attacks, and discuss their impact on the organization:
- Information theft and placement
- Physical device damage or theft
- PHY and MAC Denial of Service (DoS)
- Client hijacking, phishing, and other peer-to-peer attacks
- Protocol analysis (eavesdropping)
- MAC layer protocol attacks
- Social engineering
- Man-in-the-middle
- Authentication and encryption cracking
- Management interface exploits
- Rogue infrastructure hardware placement
Understand the probability of, demonstrate
the methodology of, and execute the preventative measures against the following
attacks on wireless infrastructure devices:
- Weak/default passwords on wireless infrastructure equipment
- Misconfiguration of wireless infrastructure devices by administrative staff
Explain and demonstrate the use of protocol
analyzers to capture the following sensitive information: Usernames / Passwords / SNMP Community
Strings / X.509 certificates
- Encryption keys / Passphrases
- MAC addresses / IP addresses
- Unencrypted data
Explain and/or demonstrate security
protocol circumvention against the following types of authentication and/or encryption:
- WEP (Any key length)
- Shared Key Authentication
- WPA-Personal / WPA2-Personal
- LEAP
- PPTP
Perform a risk assessment for a WLAN, including:
- Asset risk
- Legal implications
- Regulatory compliance
Explain and demonstrate the following
security vulnerabilities associated with public access or other unsecured
wireless networks:
- Spamming through the WLAN
- Malware (viruses / spyware / adware / remote control)
- Direct Internet attacks through the WLAN
- Placement of illegal content
- Information theft
- Peer-to-peer attack
Monitoring, Management, and Tracking
Understand how to use laptop-based protocol
and spectrum analyzers to effectively troubleshoot and secure wireless
networks.
Describe the use, configuration, and
components of an 802.11 Wireless Intrusion Prevention Systems (WIPS): WIPS server software or appliance
- Dedicated sensor hardware/software
- Access points as part-time sensors
- Access points with dedicated sensor radios
- Integration between WLAN controller and WIPS server
- Deployment strategies: overlay and integrated
- Performance and security analysis
- Protocol and spectrum analysis
Explain 802.11 WIPS baselining and demonstrate
the following tasks:
- Measuring performance parameters under normal network conditions
- Understand common reasons for false positives and false negatives
- Configuring the WIPS to recognize all APs and client stations in the area as authorized, external, or rogue
Describe and understand common security
features of 802.11 WIPS:
- Device detection, classification, and behavior analysis
- Rogue Triangulation, RF Fingerprinting, and Time Difference of Arrival (TDoA) techniques for real-time device and
- interference tracking
- Event alerting, notification, and categorization
- Policy enforcement and violation reporting
- Wired/Wireless intrusion mitigation
- Protocol analysis with filtering
- Rogue containment and remediation
- Data forensics
Describe and demonstrate the different
types of WLAN management systems and their features:
- Network discovery
- Configuration and firmware management
- Audit management and policy enforcement
- Network and user monitoring
- Rogue detection
- Event alarms and notification
Describe and implement compliance
monitoring, enforcement, and reporting
- Industry requirements (PCI)
- Government regulations
Security Design and Architecture
Describe wireless network security models
- Hotspot / Public Access / Guest Access
- Small Office / Home Office
- Small and Medium Enterprise
- Large Enterprise
- Remote Access: Mobile User and Branch Office
Recognize and understand the following
security concepts:
- 802.11 Authentication and Key Management (AKM) components and processes
- Robust Security Networks (RSN) and RSN Associations (RSNA)
- Pre-RSNA Security
- Transition Security Networks (TSN)
- RSN Information Elements
- How WPA and WPA2 certifications relate to 802.11 standard terminology and technology
- Functional parts of TKIP and its differences from WEP
- The role of TKIP/RC4 in WPA implementations
- The role of CCMP/AES in WPA2 implementations
- TKIP compatibility between WPA and WPA2 implementations
- Appropriate use and configuration of WPA-Personal and WPA-Enterprise
- Appropriate use and configuration of WPA2-Personal and WPA2-Enterprise
- Appropriate use and configuration of Per-user Pre-shared Key (PPSK)
- Feasibility of WPA-Personal and WPA2-Personal exploitation
Identify the purpose and characteristics of
802.1X and EAP:
- Supplicant, authenticator, and authentication server roles
- Functions of the authentication framework and controlled/uncontrolled ports
- How EAP is used with 802.1X port-based access control for authentication
- Strong EAP types used with 802.11 WLANs:
- PEAPv0/EAP-TLS
- PEAPv0/EAP-MSCHAPv2
- PEAPv1/EAP-GTC
- EAP-TLS
- EAP-TTLS/MS-CHAPv2
- EAP-FAST
Recognize and understand the common uses of
VPNs in wireless networks, including:
- Remote AP
- VPN client software
- WLAN Controllers
Describe, demonstrate, and configure
centrally-managed client-side security applications:
- VPN policies
- Personal firewall software
- Wireless client utility software
Describe and demonstrate the use of secure
infrastructure management protocols:
- HTTPS
- SNMPv3
- SFTP (FTP/SSL or FTP/SSH)
- SCP
- SSH2
Explain the role, importance, and limiting
factors of VLANs and network segmentation in an 802.11 WLAN infrastructure.
Describe, configure, and deploy a AAA
server and explain the following concepts related to AAA servers:
- RADIUS server
- Integrated RADIUS services within WLAN infrastructure devices
- RADIUS deployment strategies
- RADIUS proxy services
- LDAP Directory Services integration deployment strategies
- EAP support for 802.11 networks
- Applying user and AAA server credential types (Usernames/Passwords, X.509 Certificates, Protected Access Credentials (PACs), & Biometrics)
- The role of AAA services in wireless client VLAN assignments
- Benefits of mutual authentication between supplicant and authentication server
Explain frame exchange processes and the
purpose of each encryption key within 802.11 Authentication and Key Management,
including:
- Master Session Key (MSK) generation
- PMK generation and distribution
- GMK generation
- PTK / GTK generation & distribution
- 4-Way Handshake
- Group Handshake
- Passphrase-to-PSK mapping
Describe and configure major security
features in WLAN infrastructure devices:
- Role Based Access Control (RBAC) (per-user or per-group)
- Location Based Access Control (LBAC)
- Fast BSS transition in an RSN
- 802.1Q VLANs and trunking on Ethernet switches and WLAN infrastructure devices
- Hot standby/failover and clustering support
- WPA/WPA2 Personal and Enterprise
- Secure management interfaces (HTTPS, SNMPv3, SSH2)
- Intrusion detection and prevention
- Remote access (branch office and mobile users)
Explain the benefits of and configure
management frame protection (802.11w) in access points and WLAN controllers.
Explain the purpose, methodology, features,
and configuration of guest access networks, including:
- Segmentation
- Captive Portal (Web) Authentication • User-based authentication methods
Security Policy
- Explain the purpose and goals of the following WLAN security policies:
- Password policy
- End-user and administrator training on security solution use and social engineering mitigation
- Internal marketing campaigns to heighten security awareness
- Periodic network security audits
- Acceptable network use & abuse policy
- Use of Role Based Access Control (RBAC) and traffic filtering
- Obtaining the latest security feature sets through firmware and software upgrades
- Consistent implementation procedure
- Centralized implementation and management guidelines and procedures
- Inclusion in asset and change management programs
Describe appropriate installation locations
for and remote connectivity to WLAN devices in order to avoid physical theft, tampering,
and data theft. Considering the following:
- Physical security implications of infrastructure device placement
- Secure remote connections to WLAN infrastructure devices
Explain the importance and implementation
of client-side security applications:
- VPN client software and policies
- Personal firewall software
- 802.1X/EAP supplicant software
Explain the importance of on-going WLAN monitoring
and documentation:
- Explain the necessary hardware and software for on-going WLAN security monitoring
- Describe and implement WLAN security audits and compliance reports
Summarize the security policy criteria
related to wireless public access network use.
- User risks related to unsecured access
- Provider liability, disclaimers, and acceptable use notifications
Explain the importance and implementation
of a scalable and secure WLAN solution that includes the following security
parameters:
- Intrusion detection and prevention
- Role Based Access Control (RBAC) and traffic filtering
- Strong authentication and encryption
Fast BSS transition
Fast Secure Roaming
Describe and implement 802.11
Authentication and Key Management (AKM) including the following:
Preauthentication
PMK Caching
Describe and implement Opportunistic Key
Caching (OKC) and explain its enhancements beyond 802.11 AKM.
Describe and implement 802.11r
Authentication and Key Management (AKM) and compare and contrast 802.11r enhancements
with 802.11 AKM and Opportunistic Key Caching.
- Fast BSS Transition (FT) Key Architecture
- Key Nomenclature
- Initial Mobility Domain Association
- Over-the-Air Transition
- Over-the-DS Transition
Describe applications of Fast BSS
transition.
Describe and implement non-traditional
roaming mechanisms.
- Single Channel Architecture (SCA) WLAN controllers with controller-based APs
- Infrastructure-controlled handoff
Describe how 802.11k Radio Resource
Measurement factors into fast BSS transition.
- Neighbor Reports
- Contrasting SCA and MCA Architectures
Describe the importance, application, and
functionality of Wi-Fi Voice-Personal product certification
Modules
- Security Basics
- CWNA Security Review
- Industry Organisations
- Terminology
- Wireless Vulnerabilities
- Network Discovery
- Pseudo Security
- Legacy Security Mechanisms
- Network Attacks
- Recommended Practices
- Legal Considerations
- General Security Policy
- Functional Security Policy
- Network Audits and Penetration Testing
- Passphrase Authentication
- AAA
- RBAC
- RADIUS
- 802.1X
- EAP
- Robust Security Networks
- RSN Information Element
- RSN Authentication and Key Management (AKM)
- Encryption Fundamentals
- Encryption Algorithms
- WEP
- TKIP
- CCMP
- Virtual Private Networks
- Remote Networking
- Guest Access Networks
- Roaming Basics and Terminology
- Preauthentication
- PMK Caching
- Opportunistic Key Caching (OKC)
- 802.11r FT
- Proprietary Roaming
- Voice Enterprise
- Wireless Intrusion Prevention Systems (WIPS)
- WIPS Deployment Models
- WIPS Policy
- Threat Mitigation
- Location Services
- WNMS
- Protocol Analysis
- Spectrum Analysis
- Basic PSK Security
- RADIUS & 802.1X/EAP
- Users, Groups and Role Based Access Control (RBAC)
- Guest Access and Captive Portals
- Protocol Analysis
- Spectrum Analysis
- Roaming
- WIPS
- Network Attacks
Course Reviews
0
0 Ratings