The Certified Wireless Security Professional course will give learners a sound understanding of enterprise wireless LAN security and auditing techniques. It is the perfect course for which offers learners a detailed understanding of wireless intrusion prevention systems. Learners will gain in-depth skills on how to implement and manage wireless security by creating hardware and software solutions. This is a highly potential job employment course that will give learners an edge amongst their peers and employers. It will make candidates marketable in their professional goals and achievements.
The Certified Wireless Security Professional course will discuss topics such as understanding the basics of WLAN security, encryption methods, roaming wireless security risks, WLAN security auditing and dynamic encryption key generation.
The Certified Wireless Security Professional is the ideal course for individuals to learn how to implement monitoring for wireless security, remote access services and guest access services. The course is internationally recognised and accredited to a training organisation and you will be issued an internationally recognised qualification following full completion of Certified Wireless Security Professional course.
As improvements and advancements are made in technology, online courses are no longer just conventional means of studying at affordable costs. In many aspects online training offers superiority to traditional learning. There is an effectiveness and convenience that traditional learning cannot provide. The overall convenience and flexibility makes it a superior learning method.
1Training offers the most convenient path to gain an internationally recognised qualification that will give you the opportunity to put into practice your skill and expertise in an enterprise or corporate environment. You can study at your own pace at 1Training and you will be provided with all the necessary material, tutorials, qualified course instructor and multiple free resources which include Free CV writing pack, Nus Discounted Card, Free career support and course demo to make your learning experience enriching and more rewarding.
The course will be directly delivered to you, and you have 12 months access to the online learning platform from the date you joined the course. The course is self-paced and you can complete it in stages, revisiting the lectures at anytime.
At the end of the Certified Wireless Security Professional course you will be required to take a multiple choice question assessment test. The multiple choice question assessment will be automatically marked with learners receiving an instant grade.
If it is an official exam you will have to purchase it separately on the relevant website.
Those who successfully complete the exam will be awarded the certificate in Certified Wireless Security Professional.
The certificate will be awarded by National Initiative for Cybersecurity Careers and Studies (NICCS). This internationally recognised qualification will make your CV standout and encourage employers to see your motivation at expanding your skills and knowledge in the IT enterprise.
Once you successfully complete Certified Wireless Security Professional you will be qualified to work in the following positions. The Certified Wireless Security Professional qualification will also put you in line to demand a higher salary or job promotion. The average UK salary per annum according to https://www.payscale.com is given below.
➤ Module 01 - WLAN Security Overview | |||
Course Introduction | |||
1.0 WLAN Security Overview | |||
1.1 Where We Came From | |||
1.2 Standards Organizations | |||
1.3 ISO and the OSI | |||
1.4 ISOC Hierarchy | |||
1.5 Wi-Fi Alliance Standards | |||
1.6 802.11 Networking Basics | |||
1.7 Connection Types | |||
1.8 802.11 Security Basics | |||
1.9 Data Privacy | |||
1.10 AAA | |||
1.11 Segmentation | |||
1.12 Monitoring | |||
1.13 Policy | |||
1.14 Security History | |||
1.15 802.11i and WPA | |||
1.16 RSN (Robust Security Network) | |||
1.17 Future of 802.11 Security | |||
1.18 Demo – Networking Basics | |||
1.19 Demo – Web GUI Introduction | |||
1.20 Demo – Security Options | |||
1.21 Module 01 Review | |||
➤ Module 02 - Legacy Security | |||
2.0 Legacy Security | |||
2.1 Authentication | |||
2.2 Open System Authentication | |||
2.3 WEP Encryption | |||
2.4 Shared Key Authentication | |||
2.5 More About WEP | |||
2.6 Attacks Against WEP | |||
2.7 VPNs | |||
2.8 VPN Tunneling Protocols | |||
2.9 MAC Filters | |||
2.10 SSID Segmentation | |||
2.11 SSID Cloaking | |||
2.12 Demo – Security Associations | |||
2.13 Demo – MAC Spoofing | |||
2.14 Module 02 Review | |||
➤ Module 03 - Encryption Ciphers and Methods | |||
3.0 Encryption Ciphers and Methods | |||
3.1 Encryption Basics | |||
3.2 Stream and Block Ciphers | |||
3.3 WLAN Encryption Methods | |||
3.4 WEP Again | |||
3.5 TKIP | |||
3.6 MIC | |||
3.7 TKIP MPDU | |||
3.8 CCMP | |||
3.9 WPA/WPA2 | |||
3.10 Proprietary Solutions | |||
3.11 Demo – Encryption Example | |||
3.12 Module 03 Review | |||
➤ Module 04 - 802.11 Authentication Methods | |||
4.0 802.11 Authentication Methods | |||
4.1 WLAN Authentication Overview | |||
4.2 AAA | |||
4.3 Authentication | |||
4.4 Authorization | |||
4.5 Accounting | |||
4.6 802.1X | |||
4.7 Supplicant Credentials | |||
4.8 Authentication Server Credentials | |||
4.9 EAP | |||
4.10 EAP Process | |||
4.11 Legacy EAP | |||
4.12 Strong EAP Protocols | |||
4.13 PACs | |||
4.14 Demo – Certificate Authority Server Credentials | |||
4.15 Module 04 Review | |||
➤ Module 05 - Dynamic Encryption Key Generation | |||
5.0 Dynamic Encryption Key Generation | |||
5.1 Dynamic WEP | |||
5.2 RSN | |||
5.3 Management Frames & RSNIE (eNotes) | |||
5.4 RSN (Cont.) | |||
5.5 Authentication and Key Management (AKM) | |||
5.6 RSNA Key Hierarchy | |||
5.7 Master Session Key (MSK) | |||
5.8 4-Way Handshake | |||
5.9 Steps of the 4-way Handshake | |||
5.10 Group Key Handshake | |||
5.11 PeerKey Handshake | |||
5.12 Demo – EAP | |||
5.13 Demo – Information Elements | |||
5.14 Module 05 Review | |||
➤ Module 06 - SOHO 802.11 Security | |||
6.0 SOHO 802.11 Security | |||
6.1 Introduction | |||
6.2 Why a Passphrase | |||
6.3 4-Way Handshake Again | |||
6.4 Risks of WPA/WPA2 | |||
6.5 Another Risk Factor of WPA/2 | |||
6.6 Wi-Fi Protected Setup (WPS) | |||
6.7 Initial WLAN Setup | |||
6.8 SOHO Best Practices | |||
6.9 Demo – Cracking Hashes | |||
6.10 Module 06 Review | |||
➤ Module 07 - Fast Secure Roaming | |||
7.0 Fast Secure Roaming | |||
7.1 History of 802.11 Roaming | |||
7.2 Client Roaming Thresholds | |||
7.3 AP to AP Handoff (e-notes) | |||
7.4 Re-Association | |||
7.5 Types of APs | |||
7.6 RSNA Review | |||
7.7 PMKSA | |||
7.8 PMK Caching | |||
7.9 Pre-authentication | |||
710 Opportunistic Key Caching (OKC) | |||
7.11 Proprietary FSR | |||
7.12 FT Key Hierarchy (e-notes) | |||
7.13 FT Initial Mobility Domain Association | |||
7.14 Over the Air Fast BSS Transition (e-notes) | |||
7.15 Over the Air DS Fast BSS Transition (e-notes) | |||
7.16 802.11K-2008 | |||
7.17 Voice Personal and Voice Enterprise | |||
7.18 L3 Roaming | |||
7.19 Mobile IP | |||
7.20 Troubleshooting | |||
7.21 Module 07 Review | |||
➤ Module 08 - Wireless Security Risks | |||
8.0 Wireless Security Risks | |||
8.1 Introduction | |||
8.2 Rogue Devices | |||
8.3 Rogue Prevention | |||
8.4 Eavesdropping | |||
8.5 Authentication Attacks | |||
8.6 DoS | |||
8.7 L2 DoS | |||
8.8 802.11w | |||
8.9 MAC Spoofing | |||
8.10 Wireless Hijacking | |||
8.11 Peer-to-Peer Attacks | |||
8.12 Management Interface Exploits | |||
8.13 Physical Damage and Theft | |||
8.14 Social Engineering | |||
8.15 Public Access and WLAN Hotspots | |||
8.16 Demo – Rogue Devices | |||
8.17 Demo – Public Hotspots | |||
8.18 Module 08 Review | |||
➤ Module 09 - Wireless LAN Security Auditing | |||
9.0 Wireless LAN Security Auditing | |||
9.1 Purpose of Auditing | |||
9.2 WLAN Audits | |||
9.3 Layer 1 Audit | |||
9.4 Layer 2 Audit | |||
9.5 Penetration Testing | |||
9.6 Wired Infrastructure Audit | |||
9.7 Social Engineering | |||
9.8 WIPS Audit | |||
9.9 Documenting the Audit | |||
9.10 Recommendations | |||
9.11 WLAN Security Auditing Tools | |||
9.12 Module 09 Review | |||
➤ Module 10 - Wireless Security Monitoring | |||
10.0 Wireless Security Monitoring | |||
10.1 WIDS/WIPS | |||
10.2 Sensor Placement@ | |||
10.3 Example of Rogue Detection (e-notes) | |||
10.4 Device Tracking | |||
10.5 Signature Analysis | |||
10.6 Behavioral Analysis | |||
10.7 Other Types of Monitoring | |||
10.8 More on Monitoring | |||
10.9 Module 10 Review | |||
➤ Module 11 - VPNs, Remote Access and Guest Access Services | |||
11.0 VPNs, Remote Access and Guest Access Services | |||
11.1 VPN Review | |||
11.2 Remote Access | |||
11.3 Module 11 Review | |||
➤ Module 12 - WLAN Security Infrastructure | |||
12.0 WLAN Security Infrastructure | |||
12.1 WLAN Architecture | |||
12.2 Lightweight or Controller Based APs (e-notes) | |||
12.3 Other Controller Based Definitions | |||
12.4 Device Management | |||
12.5 Management Protocols | |||
12.6 Controller Communications | |||
12.7 Authorization Servers | |||
12.8 Deployment Architectures | |||
12.9 Other RADIUS Solutions | |||
12.10 RBAC | |||
12.11 Other Security Systems | |||
12.12 Module 12 Review | |||
➤ Module 13 - Wireless Security Policies | |||
13.0 Wireless Security Policies | |||
13.1 General Policy | |||
13.2 Policy Creation | |||
13.3 Policy Management | |||
13.4 Functional Policy | |||
13.5 Password Policy | |||
13.6 Other Policies | |||
13.7 Government and Industry Regulations | |||
13.8 Module 13 Review | |||
13.9 Course Closure |