Wi-Fi Security [CWSP]

Durée totale
Localisation
En ligne
Date et lieu de début
Logo Global Knowledge Belgium BV
Note du fournisseur: starstarstar_halfstar_borderstar_border 4,5 Global Knowledge Belgium BV a une moyenne de 4,5 (basée sur 2 avis)

Astuce: besoin de plus d'informations sur la formation? Téléchargez la brochure!

Dates et lieux de début

computer En ligne: VIRTUAL TRAINING CENTER
12 avr. 2021 jusqu'au 15 avr. 2021
computer En ligne: VIRTUAL TRAINING CENTER
14 juin 2021 jusqu'au 17 juin 2021
computer En ligne: VIRTUAL TRAINING CENTER
27 sept. 2021 jusqu'au 30 sept. 2021
computer En ligne: VIRTUAL TRAINING CENTER
13 déc. 2021 jusqu'au 16 déc. 2021

Description

Vrijwel iedere training die op een onze locaties worden getoond zijn ook te volgen vanaf huis via Virtual Classroom training. Dit kunt u bij uw inschrijving erbij vermelden dat u hiervoor kiest.

OVERVIEW

Using the latest enterprise wireless LAN security and auditing equipment in this hands-on course, learn, in detail, the most up-to-date WLAN intrusion and DoS tools and techniques. You will learn about functionality of the 802.11i amendment to the 802.11 standard, the inner-workings of each EAP type used with wireless LANs today, and every class and type of WLAN security solution available on the market from wireless intrusion prevention systems to wireless network management systems.

OBJECTIVES

  • WLAN security technology and solutions
  • WLAN security policy, concerns, and auditing practices
  • Layer vulnerabilities and analysis
  • WLAN mobile endpoint security solutions
  • WPA/WPA2 Personal an…

Lisez la description complète ici

Foire aux questions (FAQ)

Il n'y a pour le moment aucune question fréquente sur ce produit. Si vous avez besoin d'aide ou une question, contactez notre équipe support.

Vous n'avez pas trouvé ce que vous cherchiez ? Voir aussi : Sécurité informatique, CISSP, CompTIA, CISM et ISO 27001.

Vrijwel iedere training die op een onze locaties worden getoond zijn ook te volgen vanaf huis via Virtual Classroom training. Dit kunt u bij uw inschrijving erbij vermelden dat u hiervoor kiest.

OVERVIEW

Using the latest enterprise wireless LAN security and auditing equipment in this hands-on course, learn, in detail, the most up-to-date WLAN intrusion and DoS tools and techniques. You will learn about functionality of the 802.11i amendment to the 802.11 standard, the inner-workings of each EAP type used with wireless LANs today, and every class and type of WLAN security solution available on the market from wireless intrusion prevention systems to wireless network management systems.

OBJECTIVES

  • WLAN security technology and solutions
  • WLAN security policy, concerns, and auditing practices
  • Layer vulnerabilities and analysis
  • WLAN mobile endpoint security solutions
  • WPA/WPA2 Personal and Enterprise configurations
  • WLAN management and monitoring
  • IEEE 802.11 Authentication and Key Management (AKM)

AUDIENCE

Wireless professionals looking to gain cutting-edge wireless security expertise and earn the CWSP credential should attend.

CERTIFICATION

This CWSP training will prepare you for the Certified Wireless Security Professional (CWSP) Certification.

  • CWNP CWSP-206
  • Proctored Exam 90 minutes (60 questions: multiple choice)
  • Exam Proctor: PearsonVUE
  • Recertification: 3 years

CONTENT

Module 1 – Security Fundamentals

  • Security Basics
  • CWNA Security Review
  • Industry Organizations
  • Terminology
  • Wireless Vulnerabilities

Module 2 – Wireless Security Challenges

  • Network Discovery
  • Pseudo-Security
  • Legacy Security Mechanisms
  • Network Attacks
  • Recommended Practices

Module 3 – Security Policy

  • Defining Security Policies
  • Policy Enforcement
  • Policy Management
  • Policy Types

Module 4 – Understanding Authentication

  • Passphrase Authentication
  • AAA
  • RBAC
  • RADIUS
  • 802.1X
  • EAP

Module 5 – Authentication and Key Management

  • Robust Security Networks (RSN)
  • RSN Information Element
  • RSN Authentication and Key Management (AKM)

Module 6 – Encryption

  • Encryption Fundamentals
  • Encryption Algorithms
  • WEP
  • TKIP
  • CCMP

Module 7 – Security Design Scenarios

  • Virtual Private Networks (VPN)
  • Remote Networking
  • Guest Access Networks

Module 8 – Secure Roaming

  • Roaming Basics and Terminology
  • Preauthentication
  • PMK Caching
  • Opportunistic Key Caching (OKC)
  • 802.11r FT
  • Proprietary Roaming
  • Voice-Enterprise

Module 9 – Network Monitoring

  • Wireless Intrusion Prevention Systems (WIPS)
  • WIPS Deployment Models
  • WIPS Policy
  • Threat Mitigation
  • Location Services
  • WNMS
  • Protocol Analysis
  • Spectrum Analysis

Labs

Lab 1: WLAN Controller Security

  • Secure access to the WLAN controller using secure management protocols
  • Configure multiple WLAN profiles, each with its own authentication and cipher suites including WPA/WPA2 Personal and Enterprise
  • Configure the WLAN controller for RADIUS connectivity and authentication
  • Client station connectivity to the controller, including DHCP and browsing
  • Integrated rogue device discovery

Lab 2: Wireless Intrusion Prevention Systems (WIPS)

  • WIPS installation, licensing, add/configure sensors, and secure console connectivity
  • Configuration according to organizational policy
  • Properly classify authorized, unauthorized, and external/interfering access points
  • Identify and mitigate rogue devices
  • Identify specific attacks against the authorized WLAN infrastructure or client stations

Lab 3: Using Laptop Analyzers

  • Install and configure a WLAN discovery tool
  • Install, license, and configure a laptop protocol analyzer
  • Install, license, and configure a laptop spectrum analyzer
  • Locate and analyze 2.4 GHz and 5 GHz WLANs with a WLAN discovery tool
  • Locate and analyze 2.4 GHz and 5 GHz WLANs with a WLAN protocol analyzer
  • Capture and analyze a WPA2 Personal authentication in a WLAN protocol analyzer
  • Capture and analyze a WPA2 Enterprise authentication in a WLAN protocol analyzer
  • Capture and analyze Hotspot authentication and data traffic in a WLAN protocol analyzer
  • Capture and analyze beacons, probe requests, probe responses, and association requests with a WLAN protocol analyzer
  • View a normal RF environment, a busy RF environment, and an RF attack on the WLAN in a spectrum analyzer

Lab 4: Fast Secure Roaming

  • Configure a WLAN infrastructure with two controllers and two APs per controller
  • Configure APs for specific power and channel settings
  • Install and configure a RADIUS server for PEAP
  • Configure both controllers and an authorized client device for PEAP authentication using the CCMP cipher suite
  • Configure an 802.11 protocol analyzer to capture the BSS transition
  • Perform a slow BSS transition within a controller as a baseline
  • Enable FSR mechanisms within controllers and the client station
  • Perform a fast BSS transition within a controller as a comparison
  • Perform a slow BSS transition between controllers as a baseline
  • Perform a fast BSS transition (if vendor FSR mechanisms permit) between controllers as a comparison

Rester à jour sur les nouveaux avi

Pas encore d'avis.

Partagez vos avis

Avez-vous participé à cours? Partagez votre expérience et aider d'autres personnes à faire le bon choix. Pour vous remercier, nous donnerons 1,00 € à la fondation Stichting Edukans.

Il n'y a pour le moment aucune question fréquente sur ce produit. Si vous avez besoin d'aide ou une question, contactez notre équipe support.

Recevoir une brochure d'information (gratuit)

Sexe:
(optionnel)
(optionnel)
(optionnel)
(optionnel)
(optionnel)
(optionnel)
(optionnel)

Vous avez des questions?

(optionnel)
Nous conservons vos données personnelles dans le but de vous accompagner par email ou téléphone.
Vous pouvez trouver plus d'informations sur : Politique de confidentialité.