Mail : training@ecorptrainings.com
India : +91-8143-111-555
USA : +1-703-445-4802
uk : +44-20-3287-2021
Whats app : +91-8143-110-555
Facebook Twitter Google Plus Pinit Stumbleupon Youtube Blog

Workday HCM Demo New Batches Starting from Monday... 13-11-2017
Search Course Here




Live Chat
Support


CWSP

overview

The Certified Wireless Security Professional (CWSP) is an advanced level certification that measures the ability to secure any wireless network.A wide range of security topics focusing on the 802.11 wireless LAN technology are covered in the coursework and exam, which is vendor neutral.The CWSP certification is awarded to candidates who pass the CWSP exam and who also hold the CWNA certification. The CWNA certification is a prerequisite to earning the CWSP certification however, the CWNA and CWSP exams may be taken in any order though it is recommended that you take the CWNA exam first.
prerequisties
    Attendees should have acquired CWNA certification prior to attending this course.
Duration
Online
  • It is a 20 days program and extends up to 2hrs each.
  • The format is 40% theory, 60% Hands-on.

Corporate
  • It is a 5 days program and extends up to 8hrs each.
  • The format is 40% theory, 60% Hands-on.
Classroom
    Private Classroom arranged on request and minimum attendies for batch is 4.
course content
  • Introduction to WLAN Security Technology
    • Security policy
    • Security concerns
    • Security auditing practices
    • Application layer vulnerabilities and analysis
    • Data Link layer vulnerabilities and analysis
    • Physical layer vulnerabilities and analysis
    • 802.11 security mechanisms
    • Wi-Fi Alliance security certifications

  • Small Office / Home Office WLAN Security Technology and Solutions
    • WLAN discovery equipment and utilities.
    • Legacy WLAN security methods, mechanisms, and exploits
    • Appropriate SOHO security

  • WLAN Mobile Endpoint Security Solutions
    • Personal-class mobile endpoint security
    • Enterprise-class mobile endpoint security
    • User-accessible and restricted endpoint policies
    • VPN technology overview

  • Branch Office / Remote Office WLAN Security Technology and Solutions
    • General vulnerabilities
    • Preshared Key security with RSN cipher suites
    • Passphrase vulnerabilities
    • Passphrase entropy and hacking tools
    • WPA/WPA2 Personal - how it works
    • WPA/WPA2 Personal - configuration
    • Wi-Fi Protected Setup (WPS)
    • Installation and configuration of WIPS, WNMS, and WLAN controllers to extend enterprise security policy to remote and branch offices

  • Enterprise WLAN Management and Monitoring
    • Device identification and tracking
    • Rogue device mitigation
    • WLAN forensics
    • Enterprise WIPS installation and configuration
    • Distributed protocol analysis
    • WNMS security features
    • WLAN controller security feature sets

  • Enterprise WLAN Security Technology and Solutions
    • Robust Security Networks (RSN)
    • WPA/WPA2 Enterprise - how it works
    • WPA/WPA2 Enterprise - configuration
    • IEEE 802.11 Authentication and Key Management (AKM)
    • 802.11 cipher suites
    • Use of authentication services (RADIUS, LDAP) in WLANs
    • User profile management (RBAC)
    • Public Key Infrastructures (PKI) used with WLANs
    • Certificate Authorities and x.509 digital certificates
    • RADIUS installation and configuration
    • 802.1X/EAP authentication mechanisms
    • 802.1X/EAP types and differences
    • 802.11 handshakes
    • Fast BSS Transition (FT) technologies

  • Wireless Security Auditing
    • Review of Threats and Vulnerabilities to:
      • Wireless networks
      • Wireless devices
    • What we audit?
    • This 4-hour session is dedicated to the Specifics of:
      • What should be audited, and
      • How it should be audited?
    • Tools for Wireless Security Auditing
    • Specific examples are given for:
      • Cisco Unified Wireless Network Auditing
      • Microsoft Windows Client Auditing
      • Network Infrastructure Auditing
      • Authentication Services Auditing
    • Conducting a Wireless Security Audit:
      • Module A
      • Module B
      • Module C
      • Module D
      • Module E
      • Module F
      • Module G
    • Producing your Security Audit Report
Videos
For Videos Click Here Videos

Flash News


AngularJS New Batch Starting From 14th NOV & 15th NOV.


Hadoop Dev New Batch Starting From 15th NOV & 16th NOV.


IBM COGNOS TM New Batch Starting From 16th NOV & 17th NOV.


Informatica Dev New Batch Starting From 17th NOV & 18th NOV.


Mean Stack New Batch Starting From 18th NOV & 19th NOV.

SAP BODS new Batch Starting From 19th NOV & 20th NOV.

SAP S/4 HANA New Batch Starting From 20th NOV & 21st NOV
.

Tableau New Batch Starting From 21st NOV & 22nd NOV

PUBLIC DEMO


(1) Workday Technical Demo Training

Demo Schedule : 09:30 P.M EST / 08:30 P.M CST / 6:30 P.M PST on 13th NOV & 07:00 A.M IST on 14th NOV

SOLVE YOUR QUERIES ONLINE
Email :
Rediff Bol :
ecorptrainings@rediffmail.com
Google Talk :
ecorptrainings@gmail.com
MSN Messenger :
ecorptrainings@hotmail.com
Yahoo Messenger :
ecorptrainings@yahoo.com
Skype Talk :
ecorptrainings