Facets Demo New Batches Starting from Saturday... 22-10-2016
Search Course Here

Live Chat



The Certified Wireless Security Professional (CWSP) is an advanced level certification that measures the ability to secure any wireless network.A wide range of security topics focusing on the 802.11 wireless LAN technology are covered in the coursework and exam, which is vendor neutral.The CWSP certification is awarded to candidates who pass the CWSP exam and who also hold the CWNA certification. The CWNA certification is a prerequisite to earning the CWSP certification however, the CWNA and CWSP exams may be taken in any order though it is recommended that you take the CWNA exam first.
    Attendees should have acquired CWNA certification prior to attending this course.
  • It is a 20 days program and extends up to 2hrs each.
  • The format is 40% theory, 60% Hands-on.

  • It is a 5 days program and extends up to 8hrs each.
  • The format is 40% theory, 60% Hands-on.
    Private Classroom arranged on request and minimum attendies for batch is 4.
course content
  • Introduction to WLAN Security Technology
    • Security policy
    • Security concerns
    • Security auditing practices
    • Application layer vulnerabilities and analysis
    • Data Link layer vulnerabilities and analysis
    • Physical layer vulnerabilities and analysis
    • 802.11 security mechanisms
    • Wi-Fi Alliance security certifications

  • Small Office / Home Office WLAN Security Technology and Solutions
    • WLAN discovery equipment and utilities.
    • Legacy WLAN security methods, mechanisms, and exploits
    • Appropriate SOHO security

  • WLAN Mobile Endpoint Security Solutions
    • Personal-class mobile endpoint security
    • Enterprise-class mobile endpoint security
    • User-accessible and restricted endpoint policies
    • VPN technology overview

  • Branch Office / Remote Office WLAN Security Technology and Solutions
    • General vulnerabilities
    • Preshared Key security with RSN cipher suites
    • Passphrase vulnerabilities
    • Passphrase entropy and hacking tools
    • WPA/WPA2 Personal - how it works
    • WPA/WPA2 Personal - configuration
    • Wi-Fi Protected Setup (WPS)
    • Installation and configuration of WIPS, WNMS, and WLAN controllers to extend enterprise security policy to remote and branch offices

  • Enterprise WLAN Management and Monitoring
    • Device identification and tracking
    • Rogue device mitigation
    • WLAN forensics
    • Enterprise WIPS installation and configuration
    • Distributed protocol analysis
    • WNMS security features
    • WLAN controller security feature sets

  • Enterprise WLAN Security Technology and Solutions
    • Robust Security Networks (RSN)
    • WPA/WPA2 Enterprise - how it works
    • WPA/WPA2 Enterprise - configuration
    • IEEE 802.11 Authentication and Key Management (AKM)
    • 802.11 cipher suites
    • Use of authentication services (RADIUS, LDAP) in WLANs
    • User profile management (RBAC)
    • Public Key Infrastructures (PKI) used with WLANs
    • Certificate Authorities and x.509 digital certificates
    • RADIUS installation and configuration
    • 802.1X/EAP authentication mechanisms
    • 802.1X/EAP types and differences
    • 802.11 handshakes
    • Fast BSS Transition (FT) technologies

  • Wireless Security Auditing
    • Review of Threats and Vulnerabilities to:
      • Wireless networks
      • Wireless devices
    • What we audit?
    • This 4-hour session is dedicated to the Specifics of:
      • What should be audited, and
      • How it should be audited?
    • Tools for Wireless Security Auditing
    • Specific examples are given for:
      • Cisco Unified Wireless Network Auditing
      • Microsoft Windows Client Auditing
      • Network Infrastructure Auditing
      • Authentication Services Auditing
    • Conducting a Wireless Security Audit:
      • Module A
      • Module B
      • Module C
      • Module D
      • Module E
      • Module F
      • Module G
    • Producing your Security Audit Report
For Videos Click Here Videos

Flash News

AngularJS New Batch Start From 09th OCT & 10th OCT.

Hadoop Dev New Batch Start From 10th OCT & 11th OCT.

IBM COGNOS TM New Batch Start From 11th OCT & 12th OCT.

Informatica Dev New Batch Start From 12th OCT & 13th OCT.

Mean Stack New Batch Start 13th OCT & 14th OCT.

SAP BODS new Batch Starting From 14th OCT & 15th OCT.

SAP S/4 HANA New Batch Start From 15th OCT & 16th OCT

Tableau New Batch Start From 16th OCT & 17th OCT


Facets Demo Training

Demo Schedule : 08:30P.M EST / 07:30P.M CST / 05:30P.M PST on 21st OCT & 06:00A.M IST on 22nd OCT
Email :
Rediff Bol :
Google Talk :
MSN Messenger :
Yahoo Messenger :
Skype Talk :