• No products in the basket.

Certified Wireless Security Professional Online Course and Certification

0( 0 REVIEWS )
Certified Wireless Security Professional Online Course and Certification


The Certified Wireless Security Professional course will give learners a sound understanding of enterprise wireless LAN security and auditing techniques. It is the perfect course for which offers learners a detailed understanding of wireless intrusion prevention systems. Learners will gain in-depth skills on how to implement and manage wireless security by creating hardware and software solutions. This is a highly potential job employment course that will give learners an edge amongst their peers and employers. It will make candidates marketable in their professional goals and achievements.

The Certified Wireless Security Professional course will discuss topics such as understanding the basics of WLAN security, encryption methods, roaming wireless security risks, WLAN security auditing and dynamic encryption key generation.

The Certified Wireless Security Professional is the ideal course for individuals to learn how to implement monitoring for wireless security, remote access services and guest access services. The course is internationally recognised and accredited to a training organisation and you will be issued an internationally recognised qualification following full completion of Certified Wireless Security Professional course.

Why consider 1Training?

As improvements and advancements are made in technology, online courses are no longer just conventional means of studying at affordable costs. In many aspects online training offers superiority to traditional learning. There is an effectiveness and convenience that traditional learning cannot provide. The overall convenience and flexibility makes it a superior learning method.

1Training offers the most convenient path to gain an internationally recognised qualification that will give you the opportunity to put into practice your skill and expertise in an enterprise or corporate environment. You can study at your own pace at 1Training and you will be provided with all the necessary material, tutorials, qualified course instructor and multiple free resources which include Free CV writing pack, Nus Discounted Card, Free career support and course demo to make your learning experience enriching and more rewarding.

Learning Outcomes

  • Gain an understanding of WLAN technology.
  • Learn how to secure WLAN mobile endpoints.
  • Learn how to effectively operate and manage WLAN.
  • Gain an understanding of WLAN security policies and auditing practices and learn how to implement them within an organisation.
  • Understand authentication techniques.

Course Titles

  • Module 01: WLAN Security Overview
  • Module 02: Legacy Security
  • Module 03: Encryption Ciphers and Methods
  • Module 04: 802.11 Authentication Methods
  • Module 05: Dynamic Encryption Key Generation
  • Module 06: SOHO 802.11 Security
  • Module 07: Fast Secure Roaming
  • Module 08: Wireless Security Risks
  • Module 09: Wireless LAN Security Auditing
  • Module 10: Wireless Security Monitoring
  • Module 11: VPNs, Remote Access and Guest Access Services
  • Module 12: WLAN Security Infrastructure
  • Module 13: Wireless Security Policies

Access Duration

The course will be directly delivered to you, and you have 12 months access to the online learning platform from the date you joined the course.  The course is self-paced and you can complete it in stages, revisiting the lectures at anytime.

Who is this Course aimed at?

  • The course is for professionals who work with wireless networks and want to expand their knowledge and skills by gaining an understanding of wireless security tools and techniques.

Entry Requirements

  • Learners should have sound knowledge of the Certified Wireless Network Administrator course.
  • Learners who have passed the CWNA certification exam.

Method of Assessment

At the end of the Certified Wireless Security Professional course you will be required to take a multiple choice question assessment test. The multiple choice question assessment will be automatically marked with learners receiving an instant grade.

If it is an official exam you will have to purchase it separately on the relevant website.


Those who successfully complete the exam will be awarded the certificate in Certified Wireless Security Professional.

Awarding Body

The certificate will be awarded by National Initiative for Cybersecurity Careers and Studies (NICCS). This internationally recognised qualification will make your CV standout and encourage employers to see your motivation at expanding your skills and knowledge in the IT enterprise.

Progression and Career Path

Once you successfully complete Certified Wireless Security Professional you will be qualified to work in the following positions. The Certified Wireless Security Professional qualification will also put you in line to demand a higher salary or job promotion. The average UK salary per annum according to is given below.

  • Network Support Technician – £18,499 per annum
  • IT Manager – £38,366 per annum
  • Network Administrator – £25,250 per annum
  • System Administrator – £24,631 per annum
  • Security Consultant (Networking) – £46,517 per annum
  • IT Support Technician – £18,634 per annum

Other Benefits

  • Written and designed by the industry’s finest expert instructors with over 15 years of experience
  • Repeat and rewind all your lectures and enjoy a personalised learning experience
  • Gain access to quality video tutorials
  • Unlimited 12 months access from anywhere, anytime
  • Excellent Tutor Support Service (Monday to Friday)
  • Save time and money on travel
  • Learn at your convenience and leisure
  • Quizzes, tests mock exams, practice exams to ensure you are 100% ready
  • Eligible for a NUS discount card
  • Free Career Support Service
  • 25% Discount on personal Statement and covering letter writing service
  • Free Access to Over 150 courses for 2 days (48 hours)

Key Features

Gain an accredited UK qualification

Access to excellent quality study materials

Learners will be eligible for TOTUM Discount Card

Personalized learning experience

One year’s access to the course

Support by phone, live chat, and email

Course Curriculum Total Units : 170
➤ Module 01 - WLAN Security Overview
Course Introduction
1.0 WLAN Security Overview
1.1 Where We Came From
1.2 Standards Organizations
1.3 ISO and the OSI
1.4 ISOC Hierarchy
1.5 Wi-Fi Alliance Standards
1.6 802.11 Networking Basics
1.7 Connection Types
1.8 802.11 Security Basics
1.9 Data Privacy
1.10 AAA
1.11 Segmentation
1.12 Monitoring
1.13 Policy
1.14 Security History
1.15 802.11i and WPA
1.16 RSN (Robust Security Network)
1.17 Future of 802.11 Security
1.18 Demo – Networking Basics
1.19 Demo – Web GUI Introduction
1.20 Demo – Security Options
1.21 Module 01 Review
➤ Module 02 - Legacy Security
2.0 Legacy Security
2.1 Authentication
2.2 Open System Authentication
2.3 WEP Encryption
2.4 Shared Key Authentication
2.5 More About WEP
2.6 Attacks Against WEP
2.7 VPNs
2.8 VPN Tunneling Protocols
2.9 MAC Filters
2.10 SSID Segmentation
2.11 SSID Cloaking
2.12 Demo – Security Associations
2.13 Demo – MAC Spoofing
2.14 Module 02 Review
➤ Module 03 - Encryption Ciphers and Methods
3.0 Encryption Ciphers and Methods
3.1 Encryption Basics
3.2 Stream and Block Ciphers
3.3 WLAN Encryption Methods
3.4 WEP Again
3.5 TKIP
3.6 MIC
3.8 CCMP
3.9 WPA/WPA2
3.10 Proprietary Solutions
3.11 Demo – Encryption Example
3.12 Module 03 Review
➤ Module 04 - 802.11 Authentication Methods
4.0 802.11 Authentication Methods
4.1 WLAN Authentication Overview
4.2 AAA
4.3 Authentication
4.4 Authorization
4.5 Accounting
4.6 802.1X
4.7 Supplicant Credentials
4.8 Authentication Server Credentials
4.9 EAP
4.10 EAP Process
4.11 Legacy EAP
4.12 Strong EAP Protocols
4.13 PACs
4.14 Demo – Certificate Authority Server Credentials
4.15 Module 04 Review
➤ Module 05 - Dynamic Encryption Key Generation
5.0 Dynamic Encryption Key Generation
5.1 Dynamic WEP
5.2 RSN
5.3 Management Frames & RSNIE (eNotes)
5.4 RSN (Cont.)
5.5 Authentication and Key Management (AKM)
5.6 RSNA Key Hierarchy
5.7 Master Session Key (MSK)
5.8 4-Way Handshake
5.9 Steps of the 4-way Handshake
5.10 Group Key Handshake
5.11 PeerKey Handshake
5.12 Demo – EAP
5.13 Demo – Information Elements
5.14 Module 05 Review
➤ Module 06 - SOHO 802.11 Security
6.0 SOHO 802.11 Security
6.1 Introduction
6.2 Why a Passphrase
6.3 4-Way Handshake Again
6.4 Risks of WPA/WPA2
6.5 Another Risk Factor of WPA/2
6.6 Wi-Fi Protected Setup (WPS)
6.7 Initial WLAN Setup
6.8 SOHO Best Practices
6.9 Demo – Cracking Hashes
6.10 Module 06 Review
➤ Module 07 - Fast Secure Roaming
7.0 Fast Secure Roaming
7.1 History of 802.11 Roaming
7.2 Client Roaming Thresholds
7.3 AP to AP Handoff (e-notes)
7.4 Re-Association
7.5 Types of APs
7.6 RSNA Review
7.8 PMK Caching
7.9 Pre-authentication
710 Opportunistic Key Caching (OKC)
7.11 Proprietary FSR
7.12 FT Key Hierarchy (e-notes)
7.13 FT Initial Mobility Domain Association
7.14 Over the Air Fast BSS Transition (e-notes)
7.15 Over the Air DS Fast BSS Transition (e-notes)
7.16 802.11K-2008
7.17 Voice Personal and Voice Enterprise
7.18 L3 Roaming
7.19 Mobile IP
7.20 Troubleshooting
7.21 Module 07 Review
➤ Module 08 - Wireless Security Risks
8.0 Wireless Security Risks
8.1 Introduction
8.2 Rogue Devices
8.3 Rogue Prevention
8.4 Eavesdropping
8.5 Authentication Attacks
8.6 DoS
8.7 L2 DoS
8.8 802.11w
8.9 MAC Spoofing
8.10 Wireless Hijacking
8.11 Peer-to-Peer Attacks
8.12 Management Interface Exploits
8.13 Physical Damage and Theft
8.14 Social Engineering
8.15 Public Access and WLAN Hotspots
8.16 Demo – Rogue Devices
8.17 Demo – Public Hotspots
8.18 Module 08 Review
➤ Module 09 - Wireless LAN Security Auditing
9.0 Wireless LAN Security Auditing
9.1 Purpose of Auditing
9.2 WLAN Audits
9.3 Layer 1 Audit
9.4 Layer 2 Audit
9.5 Penetration Testing
9.6 Wired Infrastructure Audit
9.7 Social Engineering
9.8 WIPS Audit
9.9 Documenting the Audit
9.10 Recommendations
9.11 WLAN Security Auditing Tools
9.12 Module 09 Review
➤ Module 10 - Wireless Security Monitoring
10.0 Wireless Security Monitoring
10.2 Sensor Placement@
10.3 Example of Rogue Detection (e-notes)
10.4 Device Tracking
10.5 Signature Analysis
10.6 Behavioral Analysis
10.7 Other Types of Monitoring
10.8 More on Monitoring
10.9 Module 10 Review
➤ Module 11 - VPNs, Remote Access and Guest Access Services
11.0 VPNs, Remote Access and Guest Access Services
11.1 VPN Review
11.2 Remote Access
11.3 Module 11 Review
➤ Module 12 - WLAN Security Infrastructure
12.0 WLAN Security Infrastructure
12.1 WLAN Architecture
12.2 Lightweight or Controller Based APs (e-notes)
12.3 Other Controller Based Definitions
12.4 Device Management
12.5 Management Protocols
12.6 Controller Communications
12.7 Authorization Servers
12.8 Deployment Architectures
12.9 Other RADIUS Solutions
12.10 RBAC
12.11 Other Security Systems
12.12 Module 12 Review
➤ Module 13 - Wireless Security Policies
13.0 Wireless Security Policies
13.1 General Policy
13.2 Policy Creation
13.3 Policy Management
13.4 Functional Policy
13.5 Password Policy
13.6 Other Policies
13.7 Government and Industry Regulations
13.8 Module 13 Review
13.9 Course Closure
WhatsApp chat