Booking options
ยฃ25
ยฃ25
On-Demand course
13 hours 32 minutes
All levels
Secure your enterprise wireless network from hackers and other threats with the Certified Wireless Security Professional (CWSP) certification. Learn the latest WLAN security and auditing techniques and how to implement and manage wireless security solutions in the enterprise.
In the first phase of your journey, we'll unveil the secrets of legacy security protocols, arming you with the historical context necessary to understand the evolution of wireless security. You'll uncover the inner workings of encryption ciphers and methods, gaining the tools to protect data with unbreakable shields. Explore 802.11 authentication methods and become a maestro of dynamic encryption key generation, ensuring your networks are safeguarded with the utmost sophistication.
Fasten your seatbelt as we delve into the heart of SOHO 802.11 security, where you'll learn to secure small office and home office networks effectively. We'll guide you through the intricacies of fast, secure roaming, ensuring seamless transitions between access points. As your journey unfolds, you'll face the formidable challenges of wireless security risks head-on and emerge as a skilled risk mitigator. With wireless LAN security auditing and monitoring, you'll gain the expertise needed to maintain robust defenses. The course culminates with an in-depth exploration of VPNs, remote access, and guest access services, unveiling the final layers of wireless security.
By the end of this course, you'll be empowered with the wisdom and practical skills to create and implement robust wireless security policies. You'll have the confidence to navigate the complex landscape of wireless security, making you a sought-after expert in the field. Join us on this adventure, and together, we'll unlock the secrets to becoming a Certified Wireless Security Professional, ready to protect networks with unwavering confidence. Your journey to wireless security mastery begins here.
Understand the fundamentals of WLAN security.
Identify and mitigate wireless security risks.
Implement encryption ciphers and authentication methods.
Master the art of dynamic encryption key generation.
Ensure fast and secure roaming on wireless networks.
Gain the skills and knowledge you need to secure your wireless network
Improve your job prospects and earning potential
Stay up-to-date on the latest wireless security trends and technologies
Join a community of wireless security professionals
Become a certified wireless security professional
Wireless Security Analyst
Network Security Engineer
Cybersecurity Consultant
IT Security Manager
Network Administrator
Basic understanding of networking concepts
Access to a computer with internet connectivity
Eagerness to learn and engage actively in course activities
WLAN Security Overview | |||
โถ | WLAN Security Overview and Data Privacy | ๐ 00:58:00 | |
โถ | Networking Basics | ๐ 00:04:00 | |
โถ | Web GUI Introduction | ๐ 00:05:00 | |
โถ | Security Options | ๐ 00:03:00 | |
Legacy Security | |||
โถ | Legacy Security | ๐ 00:32:00 | |
โถ | VPNs | ๐ 00:21:00 | |
โถ | Security Association | ๐ 00:09:00 | |
โถ | MAC Spoofing | ๐ 00:07:00 | |
Encryption Ciphers and Methods | |||
โถ | Encryption Ciphers and Methods | ๐ 00:19:00 | |
โถ | TKIP | ๐ 00:26:00 | |
โถ | CCMP | ๐ 00:20:00 | |
โถ | Encryption Examples | ๐ 00:06:00 | |
802.11 Authentication Methods | |||
โถ | 802.11 Authentication Methods | ๐ 00:26:00 | |
โถ | 802.1X | ๐ 00:20:00 | |
โถ | EAP | ๐ 00:25:00 | |
โถ | Certified Authority Server Credentials | ๐ 00:06:00 | |
Dynamic Encryption Key Generation | |||
โถ | Dynamic Encryption Key Generation | ๐ 00:21:00 | |
โถ | Authentication and Key Management | ๐ 00:13:00 | |
โถ | RSNA Key Hierarchy | ๐ 00:12:00 | |
โถ | EAP | ๐ 00:05:00 | |
โถ | Information Elements | ๐ 00:06:00 | |
SOHO 802.11 Security | |||
โถ | SOHO 802.11 Security | ๐ 00:26:00 | |
โถ | Wi-Fi Protected Setup (WPS) | ๐ 00:20:00 | |
โถ | Cracking Hashes | ๐ 00:09:00 | |
Fast Secure Roaming | |||
โถ | Fast Secure Roaming | ๐ 00:24:00 | |
โถ | PMKSA | ๐ 00:29:00 | |
โถ | FT Key Hierarchy (e-notes) | ๐ 00:30:00 | |
โถ | 802.11K-2008 | ๐ 00:28:00 | |
Wireless Security Risks | |||
โถ | Wireless Security Risks | ๐ 00:22:00 | |
โถ | Authentication Attacks | ๐ 00:20:00 | |
โถ | Rogue Devices | ๐ 00:04:00 | |
โถ | Public Hotspots | ๐ 00:06:00 | |
Wireless LAN Security Auditing | |||
โถ | Wireless LAN Security Auditing | ๐ 00:28:00 | |
Wireless Security Monitoring | |||
โถ | Wireless Security Monitoring | ๐ 00:21:00 | |
โถ | Device Tracking | ๐ 00:17:00 | |
VPNs, Remote Access and Guest Access Services | |||
โถ | VPNs, Remote Access and Guest Access Services | ๐ 00:23:00 | |
โถ | Remote Access | ๐ 00:14:00 | |
WLAN Security Infrastructure | |||
โถ | WLAN Security Infrastructure | ๐ 00:37:00 | |
โถ | Management Protocols | ๐ 00:23:00 | |
โถ | Other RADIUS Solutions | ๐ 00:15:00 | |
Wireless Security Policies | |||
โถ | Wireless Security Policies | ๐ 00:17:00 | |
โถ | Other Policies | ๐ 00:14:00 | |
Mock Exam | |||
Mock Exam- Certified Wireless Security Professional (CWSP) - Complete Video Course | ๐ 00:20:00 | ||
Final Exam | |||
Final Exam- Certified Wireless Security Professional (CWSP) - Complete Video Course | ๐ 00:20:00 | ||
Order Your Certificate | |||
Order Your Certificate | ๐ 00:00:00 |
Skill Up presents a rigorous online education experience, helping you obtain industry-relevant skills certified by the worldโs...