O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Certified Wireless Security Professional (CWSP)

Video Description

The Certified Wireless Security Professional (CWSP) course is designed on the CWSP certification exam curriculum recommended by CWNP. The course teaches the latest enterprise wireless LAN security and auditing techniques to the students. The course also covers the most up-to-date WLAN intrusion and DoS tools and techniques. The students are enabled on the functionality of the 802.11i amendment to the 802.11 standard, the inner-workings of each authentication method used with wireless LANs, and every class and type of WLAN security solution available. This includes a detailed coverage of the wireless intrusion prevention systems and wireless network management systems. The Certified Wireless Security Professional (CWSP) course will help the students to acquire the necessary skills for implementing and managing wireless security in the enterprise by creating layer2 and layer3 hardware and software solutions with tools from the industry’s leading manufacturers. The course also serves as an excellent preparatory course for the CWSP certification offered by CWNP.

Table of Contents

  1. Course Introduction
    1. Introduction 00:00:10
    2. Course Introduction 00:01:35
    3. Instructor Introduction 00:01:42
  2. WLAN Security Overview
    1. WLAN Security Overview 00:01:40
    2. Where We Came From 00:02:26
    3. Standards Organizations 00:01:31
    4. ISO and the OSI 00:10:25
    5. ISOC Hierarchy 00:03:00
    6. Wi-Fi Alliance Standards 00:07:02
    7. 802.11 Networking Basics Part1 00:01:28
    8. 802.11 Networking Basics Part2 00:02:43
    9. Connection Types 00:02:09
    10. 802.11 Security Basics 00:01:55
    11. Data Privacy Part1 00:01:48
    12. Data Privacy Part2 00:03:15
    13. AAA 00:01:34
    14. Segmentation 00:03:46
    15. Monitoring 00:01:43
    16. Policy 00:01:19
    17. Security History 00:00:51
    18. 802.11i and WPA Part1 00:00:45
    19. 802.11i and WPA Part2 00:01:37
    20. 802.11i and WPA Part3 00:02:36
    21. RSN (Robust Security Network) 00:00:55
    22. Future of 802.11 Security Part1 00:01:44
    23. Future of 802.11 Security Part2 00:01:30
    24. Demo - Networking Basics 00:04:46
    25. Demo - Web GUI Introduction 00:05:13
    26. Demo - Security Options 00:03:14
    27. Section Review 00:00:49
  3. Legacy Security
    1. Legacy Security 00:00:49
    2. Authentication 00:01:01
    3. Open System Authentication 00:02:31
    4. WEP Encryption 00:04:09
    5. Shared Key Authentication 00:02:27
    6. More About WEP Part1 00:06:06
    7. More About WEP Part2 00:08:59
    8. Attacks Against WEP 00:06:20
    9. VPNs Part1 00:03:26
    10. VPNs Part2 00:06:19
    11. VPN Tunneling Protocols 00:01:49
    12. MAC Filters 00:02:36
    13. SSID Segmentation 00:04:26
    14. SSID Cloaking 00:01:59
    15. Demo - Security Associations 00:09:40
    16. Demo - Security Associations Part A 00:04:39
    17. Demo - Security Associations Part B 00:05:01
    18. Demo - MAC Spoofing 00:06:50
    19. Section Review 00:00:40
  4. Encryption Ciphers and Methods
    1. Encryption Ciphers and Methods 00:00:37
    2. Encryption Basics 00:08:19
    3. Stream and Block Ciphers 00:06:01
    4. WLAN Encryption Methods 00:03:08
    5. WEP Again 00:01:03
    6. TKIP Part1 00:06:54
    7. TKIP Part2 00:07:32
    8. MIC 00:06:59
    9. TKIP MPDU 00:05:02
    10. CCMP Part1 00:03:50
    11. CCMP Part2 00:04:08
    12. CCMP Part3 00:03:23
    13. CCMP Part4 00:02:24
    14. CCMP Part5 00:03:45
    15. WPA/WPA2 00:01:15
    16. Proprietary Solutions 00:00:51
    17. Demo - Encryption Example 00:06:28
    18. Section Review 00:00:23
  5. 802.11 Authentication Methods
    1. 802.11 Authentication Methods 00:00:44
    2. WLAN Authentication Overview 00:08:00
    3. AAA 00:02:36
    4. Authentication 00:07:11
    5. Authorization 00:03:21
    6. Accounting 00:04:45
    7. 802.1X 00:05:05
    8. Supplicant Credentials 00:07:27
    9. Authentication Server Credentials 00:08:02
    10. EAP 00:04:23
    11. EAP Process 00:05:51
    12. Legacy EAP 00:03:55
    13. Strong EAP Protocols 00:04:48
    14. PACs 00:04:46
    15. Demo - Certificate Authority Server Credentials 00:05:51
    16. Section Review 00:00:41
  6. Dynamic Encryption Key Generation
    1. Dynamic Encryption Key Generation 00:01:07
    2. Dynamic WEP 00:06:00
    3. RSN 00:06:44
    4. Management Frames & RSNIE (eNotes) 00:06:30
    5. RSN (Cont.) 00:01:12
    6. Authentication and Key Management (AKM) Part1 00:04:22
    7. Authentication and Key Management (AKM) Part2 00:05:14
    8. Authentication and Key Management (AKM) Part3 00:00:43
    9. Authentication and Key Management (AKM) Part4 00:02:41
    10. RSNA Key Hierarchy 00:02:23
    11. Master Session Key (MSK) 00:02:23
    12. 4-Way Handshake 00:03:18
    13. Steps of the 4 -way Handshake 00:00:51
    14. Group Key Handshake 00:01:07
    15. PeerKey Handshake 00:02:01
    16. Demo - EAP 00:05:36
    17. Demo - Information Elements 00:06:40
    18. Section Review 00:00:57
  7. SOHO 802.11 Security
    1. SOHO 802.11 Security 00:00:25
    2. Introduction 00:04:49
    3. Why a Passphrase 00:07:32
    4. 4-Way Handshake Again 00:05:54
    5. Risks of WPA/WPA2 00:04:49
    6. Another Risk Factor of WPA/2 00:03:04
    7. Wi -Fi Protected Setup (WPS) Part1 00:02:32
    8. Wi -Fi Protected Setup (WPS) Part2 00:04:25
    9. Wi -Fi Protected Setup (WPS) Part3 00:00:26
    10. Wi -Fi Protected Setup (WPS) Part4 00:03:34
    11. Wi -Fi Protected Setup (WPS) Part5 00:01:02
    12. Initial WLAN Setup 00:01:41
    13. SOHO Best Practices 00:05:56
    14. Demo - Cracking Hashes 00:09:37
    15. Section Review 00:00:40
  8. Fast Secure Roaming
    1. Fast Secure Roaming 00:01:07
    2. History of 802.11 Roaming 00:04:11
    3. Client Roaming Thresholds 00:03:02
    4. AP to AP Handoff (e -notes) 00:09:11
    5. Re -Association 00:02:02
    6. Types of APs 00:03:09
    7. RSNA Review 00:01:47
    8. PMKSA 00:07:47
    9. PMK Caching 00:01:58
    10. Pre -authentication 00:03:30
    11. Opportunistic Key Caching (OKC) 00:10:01
    12. Proprietary FSR 00:06:04
    13. FT Key Hierarchy (e -notes) 00:09:09
    14. FT Initial Mobility Domain Association 00:02:18
    15. Over the Air Fast BSS Transition (e -notes) 00:06:07
    16. Over the Air DS Fast BSS Transition (e - notes) 00:12:26
    17. 802.11K -2008 00:03:51
    18. L3 Roaming 00:10:44
    19. Mobile IP 00:04:46
    20. Troubleshooting 00:03:36
    21. Voice Personal and Voice Enterprise 00:04:51
    22. Section Review 00:00:50
  9. Wireless Security Risks
    1. Wireless Security Risks 00:00:42
    2. Introduction 00:00:26
    3. Rogue Devices Part1 00:09:12
    4. Rogue Devices Part2 00:03:43
    5. Rogue Prevention 00:03:13
    6. Eavesdropping 00:04:41
    7. Authentication Attacks 00:01:17
    8. DoS 00:05:45
    9. L2 DoS 00:01:11
    10. 802.11w 00:00:54
    11. MAC Spoofing 00:01:48
    12. Wireless Hijacking 00:02:43
    13. Peer-to-Peer Attacks 00:01:50
    14. Management Interface Exploits 00:02:42
    15. Physical Damage and Theft 00:00:41
    16. Social Engineering 00:00:47
    17. Public Access and WLAN Hotspots 00:00:38
    18. Demo - Rogue Devices 00:04:26
    19. Demo - Public Hotspots 00:06:33
    20. Section Review 00:00:31
  10. Wireless LAN Security Auditing
    1. Wireless LAN Security Auditing 00:00:19
    2. Purpose of Auditing 00:01:27
    3. WLAN Audits Part1 00:01:52
    4. WLAN Audits Part2 00:00:46
    5. Layer 1 Audit 00:05:13
    6. Layer 2 Audit 00:02:14
    7. Penetration Testing 00:03:58
    8. Wired Infrastructure Audit 00:03:08
    9. Social Engineering 00:01:47
    10. WIPS Audit 00:00:53
    11. Documenting the Audit 00:04:10
    12. Recommendations 00:00:44
    13. WLAN Security Auditing Tools 00:01:33
    14. Section Review 00:00:24
  11. Wireless Security Monitoring
    1. Wireless Security Monitoring 00:00:46
    2. WIDS/WIPS 00:01:02
    3. WIDS/WIPS (Cont.) 00:06:23
    4. Sensor Placement 00:03:57
    5. Example of Rogue Detection (e -notes) 00:08:57
    6. Device Tracking 00:06:53
    7. Signature Analysis 00:01:04
    8. Behavioral Analysis 00:02:23
    9. Other Types of Monitoring 00:05:57
    10. More on Monitoring 00:00:52
    11. Section Review 00:00:24
  12. VPNs, Remote Access and Guest Access Services
    1. VPNs, Remote Access and Guest Access Services 00:00:34
    2. VPN Review Part1 00:11:18
    3. VPN Review Part2 00:11:00
    4. Remote Access Part1 00:06:21
    5. Remote Access Part2 00:07:22
    6. Section Review 00:00:22
  13. WLAN Security Infrastructure
    1. WLAN Security Infrastructure 00:00:40
    2. WLAN Architecture 00:07:36
    3. Lightweight or Controller Based APs (e-notes) 00:08:17
    4. Other Controller Based Definitions 00:14:08
    5. Device Management 00:06:58
    6. Management Protocols 00:06:49
    7. Controller Communications 00:05:27
    8. Authorization Servers 00:03:13
    9. Deployment Architectures 00:07:41
    10. Other RADIUS Solutions 00:04:49
    11. RBAC 00:04:18
    12. Other Security Systems 00:06:18
    13. Section Review 00:00:23
  14. Wireless Security Policies
    1. Wireless Security Policies 00:00:21
    2. General Policy Part1 00:02:14
    3. General Policy Part2 00:04:16
    4. Policy Creation 00:03:14
    5. Policy Management 00:02:26
    6. Functional Policy 00:02:52
    7. Password Policy 00:01:40
    8. Other Policies Part1 00:03:33
    9. Other Policies Part2 00:02:18
    10. Government and Industry Regulations 00:06:21
    11. Section Review 00:00:25
    12. Course Closure 00:01:48