Cisco-Ausbildung

Insoft Services ist einer der wenigen Schulungsanbieter in EMEAR, der ein umfassendes Angebot an Cisco-Zertifizierungen und spezialisierten Technologieschulungen anbietet.

Lesen Sie mehr

Cisco Zertifizierungen

Erleben Sie einen Blended-Learning-Ansatz, der das Beste aus von Lehrern geleiteten Schulungen und E-Learning zum Selbststudium kombiniert, um sich auf Ihre Zertifizierungsprüfung vorzubereiten.

Lesen Sie mehr

Cisco Learning Credits

Cisco Learning Credits (CLCs) sind Prepaid-Schulungsgutscheine, die direkt bei Cisco eingelöst werden und die Planung für Ihren Erfolg beim Kauf von Cisco-Produkten und -Services erleichtern.

Lösen Sie Ihre CLCs ein

Cisco Continuing Education

Das Cisco Continuing Education Program bietet allen aktiven Zertifizierungsinhabern flexible Optionen zur Rezertifizierung, indem sie eine Vielzahl von in Frage kommenden Schulungselementen absolvieren.

Lesen Sie mehr

Cisco Digital Learning

Zertifizierte Mitarbeiter sind GESCHÄTZTE Vermögenswerte. Erkunden Sie die offizielle Digital Learning Library von Cisco, um sich durch aufgezeichnete Sitzungen weiterzubilden.

CDLL-Katalog

Cisco Business Enablement

Das Cisco Business Enablement Partner Program konzentriert sich auf die Verbesserung der Geschäftsfähigkeiten von Cisco Channel Partnern und Kunden.

Lesen Sie mehr

Cisco Schulungskatalog

Lesen Sie mehr

Technische Zertifizierung

Das Fortinet Network Security Expert (NSE) -Programm ist ein achtstufiges Schulungs- und Zertifizierungsprogramm, um Ingenieuren ihre Netzwerksicherheit für Fortinet FW-Fähigkeiten und -Erfahrungen beizubringen.

Technische Kurse

Fortinet-Ausbildung

Insoft ist als Fortinet Authorized Training Center an ausgewählten Standorten in EMEA anerkannt.

Lesen Sie mehr

Fortinet Schulungskatalog

Lesen Sie mehr

ATC Status

Überprüfen Sie unseren ATC-Status in ausgewählten Ländern in Europa.

Lesen Sie mehr

Fortinet Service-Pakete

Insoft Services hat eine spezielle Lösung entwickelt, um den Prozess der Installation oder Migration zu Fortinet-Produkten zu rationalisieren und zu vereinfachen.

Lesen Sie mehr

Microsoft-Ausbildung

Insoft Services bietet Microsoft-Schulungen in EMEAR an. Wir bieten technische Schulungen und Zertifizierungskurse von Microsoft an, die von erstklassigen Instruktoren geleitet werden.

Technische Kurse

Extreme-Ausbildung

Erfahren Sie außergewöhnliche Kenntnisse und Fähigkeiten von Extreme Networks.

Technische Kurse

Technische Zertifizierung

Wir bieten einen umfassenden Lehrplan für technische Kompetenzen zur Zertifizierung an.

Lesen Sie mehr

Extreme Schulungskatalog

Hier finden Sie alle Extreme Networks online und den von Lehrern geleiteten Kalender für den Klassenraum.

Lesen Sie mehr

ATP-Akkreditierung

Als autorisierter Schulungspartner (ATP) stellt Insoft Services sicher, dass Sie die höchsten verfügbaren Bildungsstandards erhalten.

Lesen Sie mehr

Lösungen & Dienstleistungen

Wir bieten innovative und fortschrittliche Unterstützung bei der Konzeption, Implementierung und Optimierung von IT-Lösungen. Unsere Kundenbasis umfasst einige der größten Telcos weltweit.

Beratungspakete

Ein weltweit anerkanntes Team von zertifizierten Experten unterstützt Sie bei einem reibungsloseren Übergang mit unseren vordefinierten Beratungs-, Installations- und Migrationspaketen für eine breite Palette von Fortinet-Produkten.

Über uns

Insoft bietet autorisierte Schulungs- und Beratungsdienstleistungen für ausgewählte IP-Anbieter. Erfahren Sie, wie wir die Branche revolutionieren.

Lesen Sie mehr
  • +49 6151 277 6496
  • CWSP - Certified Wireless Security Professional

    Duration
    3 Tage
    Delivery
    (Online Und Vor Ort)
    Price
    Preis auf Anfrage

    The Wireless LAN Security course consists of hands on learning using the latest enterprise wireless LAN security and auditing equipment. This course addresses in detail the most up-to-date WLAN intrusion and DoS tools and techniques, functionality of the 802.11i amendment to the 802.11 standard, the inner-workings of each EAP type used with wireless LANs today, and every class and type of WLAN security solution available on the market, from wireless intrusion prevention systems to wireless network management systems.

     

    Students who complete the course will acquire the necessary skills for implementing and managing wireless security in the enterprise by creating layer2 and layer3 hardware and software solutions with tools from the industry leading manufacturers.

     

    This course is excellent preparation for the challenging CWSP Certification, and includes practice exams and “Exam Cram” sessions. It is also very hands-on intensive, roughly 50% hands-on, with lots of time to get your hands on real equipment to perform actual Site Survey work.

     

    This intensive course covers all that is required to prepare for the CWNA Certification, including:

    • hands-on training
    • Official CWSP practice test questions
    • Exam voucher for the CWSP Certification Exam (# PW0-204)
    • Mentor support after class by our Wireless Expert team

     

    It also ensures that students leave with real hands on skills. Hands-on exercises include the following:

    • WLAN Controller Security
    • Wireless Intrusion Prevention Systems (WIPS)
    • WLAN infrastructure or client stations
    • Using Laptop Analyzers
    • Fast Secure Roaming

    During this course, you will develop skills and knowledge on the following objectives:

    • WLAN Discovery Techniques
    • Intrusion and Attack Techniques
    • 802.11 Protocol Analysis
    • Wireless Intrusion Prevention Systems (WIPS) Implementation
    • Layer 2 and 3 VPNs used over 802.11 networks
    • Enterprise/SMB/SOHO/Public-Network Security design models
    • Managed Endpoint Security Systems802.11 Authentication and Key Management Protocols
    • Enterprise/SMB/SOHO/Public-Network Security Solution Implmentation
    • Building Robust Security Networks from the ground up
    • Fast BSS Transition (aka. Fast/Secure Roaming) Techniques
    • Thorough coverage of all 802.1X/EAP types used in WLANs
    • Wireless LAN Management Systems (WNMS)
    • Authentication Infrastructure Design Models
    • Using Secure Applications
    • 802.11 Design Architectures
    • Implementing a Thorough Wireless Security Policy

    Hands-On Lab Exercises:

    WLAN Controller Security

    • Secure access to the WLAN controller using secure management protocols
    • Configuring multiple WLAN profiles, each with its own authentication and cipher suites including WPA/WPA2 Personal and Enterprise
    • Configuring the WLAN controller for RADIUS connectivity and authentication
    • Client station connectivity to the controller – including DHCP and browsing
    • Integrated rogue device discovery

     

    Wireless Intrusion Prevention Systems (WIPS)

    • WIPS installation, licensing, adding/configuring sensors, and secure console connectivity
    • Configuration according to organizational policy
    • Properly classifying authorized, unauthorized, and external/interfering access points
    • Identifying and mitigating rogue devices
    • Identifying specific attacks against the authorized WLAN infrastructure or client stations

     

    Using Laptop Analyzers

    • Installing and configuring a WLAN discovery tool
    • Installing, licensing, and configuring a laptop protocol analyzer
    • Installing, licensing, and configuring a laptop spectrum analyzer
    • Locating and analyzing 2.4 GHz and 5 GHz WLANs with a WLAN discovery tool
    • Locating and analyzing 2.4 GHz and 5 GHz WLANs with a WLAN protocol analyzer
    • Capturing and analyzing a WPA2-Personal authentication in a WLAN protocol analyzer
    • Capturing and analyzing a WPA2-Enterprise authentication in a WLAN protocol analyzer
    • Capturing and analyzing Hotspot authentication and data traffic in a WLAN protocol analyzer
    • Capturing and analyzing Beacons, Probe Requests, Probe Responses, and Association Requests with a WLAN protocol analyzer
    • Viewing a normal RF environment, a busy RF environment, and an RF attack on the WLAN in a spectrum analyzer

     

    Fast Secure Roaming

    • Configure a WLAN infrastructure with two controllers and two APs per controller. Configure APs for specific power and channel settings
    • Install and configure a RADIUS server for PEAP
    • Configure both controllers and an authorized client device for PEAP authentication using the CCMP cipher suite
    • Configure an 802.11 protocol analyzer to capture the BSS transition
    • Perform a slow BSS transition within a controller as a baseline
    • Enable FSR mechanisms within controllers and the client station
    • Perform a fast BSS transition within a controller as a comparison
    • Perform a slow BSS transition between controllers as a baseline
    • Perform a fast BSS transition (if vendor FSR mechanisms permit) between controllers as a comparison

     

    Introduction to WLAN Security Technology

    • Security policy
    • Security concerns
    • Security auditing practices
    • Application layer vulnerabilities and analysis
    • Data Link layer vulnerabilities and analysis
    • Physical layer vulnerabilities and analysis
    • 802.11 security mechanisms
    • Wi-Fi Alliance security certifications

     

    Small Office / Home Office WLAN Security Technology and Solutions

    • WLAN discovery equipment and utilities
    • Legacy WLAN security methods, mechanisms, and exploits
    • Appropriate SOHO security

     

    WLAN Mobile Endpoint Security Solutions

    • Personal-class mobile endpoint security
    • Enterprise-class mobile endpoint security
    • User-accessible and restricted endpoint policies
    • VPN technology overview

     

    Branch Office / Remote Office WLAN Security Technology and Solutions

    • General vulnerabilities
    • Preshared Key security with RSN cipher suites
    • Passphrase vulnerabilities
    • Passphrase entropy and hacking tools
    • WPA/WPA2 Personal – how it works
    • WPA/WPA2 Personal – configuration
    • Wi-Fi Protected Setup (WPS)
    • Installation and configuration of WIPS, WNMS, and WLAN controllers to extend enterprise security policy to remote and branch offices

     

    Enterprise WLAN Management and Monitoring

    • Device identification and tracking
    • Rogue device mitigation
    • WLAN forensics
    • Enterprise WIPS installation and configuration
    • Distributed protocol analysis
    • WNMS security features
    • WLAN controller security feature sets

     

    Enterprise WLAN Security Technology and Solutions

    • Robust Security Networks (RSN)
    • WPA/WPA2 Enterprise – how it works
    • WPA/WPA2 Enterprise – configuration
    • IEEE 802.11 Authentication and Key Management (AKM)
    • 802.11 cipher suites
    • Use of authentication services (RADIUS, LDAP) in WLANs
    • User profile management (RBAC)
    • Public Key Infrastructures (PKI) used with WLANs
    • Certificate Authorities and x.509 digital certificates
    • RADIUS installation and configuration
    • 802.1X/EAP authentication mechanisms
    • 802.1X/EAP types and differences
    • 802.11 handshakes
    • Fast BSS Transition (FT) technologies

    This intensive, 5 day course is intended for network and system administrators, consultants and engineers that need to support Wireless LAN deployments.


    It also is a great course for all infrastructure security professionals

    The Following prerequisite knowledge and skills are suggested prior to attending the CWSP Course:

    • CWNA Certification or the equivalent in knowledge and experience.
    • Note that CWSP Certification does require that the candidate pass the CWNA certification exam (PW0-104) as well as the CWSP certification exam (PW0-204) in order to achieve certified status.

    The Wireless LAN Security course consists of hands on learning using the latest enterprise wireless LAN security and auditing equipment. This course addresses in detail the most up-to-date WLAN intrusion and DoS tools and techniques, functionality of the 802.11i amendment to the 802.11 standard, the inner-workings of each EAP type used with wireless LANs today, and every class and type of WLAN security solution available on the market, from wireless intrusion prevention systems to wireless network management systems.

     

    Students who complete the course will acquire the necessary skills for implementing and managing wireless security in the enterprise by creating layer2 and layer3 hardware and software solutions with tools from the industry leading manufacturers.

     

    This course is excellent preparation for the challenging CWSP Certification, and includes practice exams and “Exam Cram” sessions. It is also very hands-on intensive, roughly 50% hands-on, with lots of time to get your hands on real equipment to perform actual Site Survey work.

     

    This intensive course covers all that is required to prepare for the CWNA Certification, including:

    • hands-on training
    • Official CWSP practice test questions
    • Exam voucher for the CWSP Certification Exam (# PW0-204)
    • Mentor support after class by our Wireless Expert team

     

    It also ensures that students leave with real hands on skills. Hands-on exercises include the following:

    • WLAN Controller Security
    • Wireless Intrusion Prevention Systems (WIPS)
    • WLAN infrastructure or client stations
    • Using Laptop Analyzers
    • Fast Secure Roaming

    During this course, you will develop skills and knowledge on the following objectives:

    • WLAN Discovery Techniques
    • Intrusion and Attack Techniques
    • 802.11 Protocol Analysis
    • Wireless Intrusion Prevention Systems (WIPS) Implementation
    • Layer 2 and 3 VPNs used over 802.11 networks
    • Enterprise/SMB/SOHO/Public-Network Security design models
    • Managed Endpoint Security Systems802.11 Authentication and Key Management Protocols
    • Enterprise/SMB/SOHO/Public-Network Security Solution Implmentation
    • Building Robust Security Networks from the ground up
    • Fast BSS Transition (aka. Fast/Secure Roaming) Techniques
    • Thorough coverage of all 802.1X/EAP types used in WLANs
    • Wireless LAN Management Systems (WNMS)
    • Authentication Infrastructure Design Models
    • Using Secure Applications
    • 802.11 Design Architectures
    • Implementing a Thorough Wireless Security Policy

    Hands-On Lab Exercises:

    WLAN Controller Security

    • Secure access to the WLAN controller using secure management protocols
    • Configuring multiple WLAN profiles, each with its own authentication and cipher suites including WPA/WPA2 Personal and Enterprise
    • Configuring the WLAN controller for RADIUS connectivity and authentication
    • Client station connectivity to the controller – including DHCP and browsing
    • Integrated rogue device discovery

     

    Wireless Intrusion Prevention Systems (WIPS)

    • WIPS installation, licensing, adding/configuring sensors, and secure console connectivity
    • Configuration according to organizational policy
    • Properly classifying authorized, unauthorized, and external/interfering access points
    • Identifying and mitigating rogue devices
    • Identifying specific attacks against the authorized WLAN infrastructure or client stations

     

    Using Laptop Analyzers

    • Installing and configuring a WLAN discovery tool
    • Installing, licensing, and configuring a laptop protocol analyzer
    • Installing, licensing, and configuring a laptop spectrum analyzer
    • Locating and analyzing 2.4 GHz and 5 GHz WLANs with a WLAN discovery tool
    • Locating and analyzing 2.4 GHz and 5 GHz WLANs with a WLAN protocol analyzer
    • Capturing and analyzing a WPA2-Personal authentication in a WLAN protocol analyzer
    • Capturing and analyzing a WPA2-Enterprise authentication in a WLAN protocol analyzer
    • Capturing and analyzing Hotspot authentication and data traffic in a WLAN protocol analyzer
    • Capturing and analyzing Beacons, Probe Requests, Probe Responses, and Association Requests with a WLAN protocol analyzer
    • Viewing a normal RF environment, a busy RF environment, and an RF attack on the WLAN in a spectrum analyzer

     

    Fast Secure Roaming

    • Configure a WLAN infrastructure with two controllers and two APs per controller. Configure APs for specific power and channel settings
    • Install and configure a RADIUS server for PEAP
    • Configure both controllers and an authorized client device for PEAP authentication using the CCMP cipher suite
    • Configure an 802.11 protocol analyzer to capture the BSS transition
    • Perform a slow BSS transition within a controller as a baseline
    • Enable FSR mechanisms within controllers and the client station
    • Perform a fast BSS transition within a controller as a comparison
    • Perform a slow BSS transition between controllers as a baseline
    • Perform a fast BSS transition (if vendor FSR mechanisms permit) between controllers as a comparison

     

    Introduction to WLAN Security Technology

    • Security policy
    • Security concerns
    • Security auditing practices
    • Application layer vulnerabilities and analysis
    • Data Link layer vulnerabilities and analysis
    • Physical layer vulnerabilities and analysis
    • 802.11 security mechanisms
    • Wi-Fi Alliance security certifications

     

    Small Office / Home Office WLAN Security Technology and Solutions

    • WLAN discovery equipment and utilities
    • Legacy WLAN security methods, mechanisms, and exploits
    • Appropriate SOHO security

     

    WLAN Mobile Endpoint Security Solutions

    • Personal-class mobile endpoint security
    • Enterprise-class mobile endpoint security
    • User-accessible and restricted endpoint policies
    • VPN technology overview

     

    Branch Office / Remote Office WLAN Security Technology and Solutions

    • General vulnerabilities
    • Preshared Key security with RSN cipher suites
    • Passphrase vulnerabilities
    • Passphrase entropy and hacking tools
    • WPA/WPA2 Personal – how it works
    • WPA/WPA2 Personal – configuration
    • Wi-Fi Protected Setup (WPS)
    • Installation and configuration of WIPS, WNMS, and WLAN controllers to extend enterprise security policy to remote and branch offices

     

    Enterprise WLAN Management and Monitoring

    • Device identification and tracking
    • Rogue device mitigation
    • WLAN forensics
    • Enterprise WIPS installation and configuration
    • Distributed protocol analysis
    • WNMS security features
    • WLAN controller security feature sets

     

    Enterprise WLAN Security Technology and Solutions

    • Robust Security Networks (RSN)
    • WPA/WPA2 Enterprise – how it works
    • WPA/WPA2 Enterprise – configuration
    • IEEE 802.11 Authentication and Key Management (AKM)
    • 802.11 cipher suites
    • Use of authentication services (RADIUS, LDAP) in WLANs
    • User profile management (RBAC)
    • Public Key Infrastructures (PKI) used with WLANs
    • Certificate Authorities and x.509 digital certificates
    • RADIUS installation and configuration
    • 802.1X/EAP authentication mechanisms
    • 802.1X/EAP types and differences
    • 802.11 handshakes
    • Fast BSS Transition (FT) technologies

    This intensive, 5 day course is intended for network and system administrators, consultants and engineers that need to support Wireless LAN deployments.


    It also is a great course for all infrastructure security professionals

    The Following prerequisite knowledge and skills are suggested prior to attending the CWSP Course:

    • CWNA Certification or the equivalent in knowledge and experience.
    • Note that CWSP Certification does require that the candidate pass the CWNA certification exam (PW0-104) as well as the CWSP certification exam (PW0-204) in order to achieve certified status.
      Termine
      Datum auf Anfrage

    Follow Up Courses

    Filter
    • 4 Tage
      Datum auf Anfrage
      Price on Request
      Book Now
    • 1 Tag
      Datum auf Anfrage
      Price on Request
      Book Now
    • 3 Tage
      Datum auf Anfrage
      Price on Request
      Book Now
    • 4 Tage
      Datum auf Anfrage
      Price on Request
      Book Now
    • 1 Tag
      Datum auf Anfrage
      Price on Request
      Book Now
    • 3 Tage
      Datum auf Anfrage
      Price on Request
      Book Now

    Know someone who´d be interested in this course?
    Let them know...

    Use the hashtag #InsoftLearning to talk about this course and find students like you on social media.