Certified Wireless Security Professional (CWSP) — a 5-day CWSP training course

Certified Wireless Security Professional (CWSP) course - version 5

This LEVER course has been superseded by the
new WCC Certified Wireless Security Manager course

CWSP Training Courses  The World's ONLY CWNP GOLD Partner
Course duration: 5 days

27 Apr - 1 May 2020
13 - 17 July 2020
17 - 21 October 2020
Course Price: £2995


Related courses:

CWSP Courses

CWSP Training Course Roadmaps

Only from:


Call +44 (0)113 398 3300

Limited places available

Choose dates to enrol on this CWSP course:

Your Course Includes

Comprehensive Training and Reference Manuals (x2) - more than 400 pages in total

Comprehensive, Sybex CWSP-205 Exam Study Guide - the Study Guide preferred by experienced Wi-Fi network engineers

The World's leading 5-day Wi-Fi Network Engineer training course - supersedes previous CWSP course

40 hours of Expert training from Europe's Leading Wi-Fi Engineer Training and Certification company

Unrivalled course content, full-colour courseware, exam-prep materials, hands-on labs, expert advice from the UK's leading Wi-Fi network engineering Company.

Lifetime Post-Training Support - to help you in your future career.

Why this CWSP course?

In recognition of our authority in Wi-Fi training and education, CWNP.com appointed LEVER as the World's First and only CWNP GOLD Learning Partner. When you choose LEVER for your Wi-Fi training, you can be certain that:

LEVER's Certified Wireless Security Profesional (CWSP) training course comprises hands-on learning using the latest enterprise-grade Wi-Fi networking equipment.

The course covers in detail the most important and relevant IEEE 802.11 / Wi-Fi WLAN security protocols, exchanges and deployment strategies.

The course focuses on understanding the functionality of the 802.11i amendment / Wi-F Protected Access (WPA) versions 1 and 2, including Authentication, Key Generation, Encryption and Key Management. IEEE 802.1X and EAP (WPA Enterprise mode authentication) are a core part of the course, along with WPA Pre-Shared Key (WPA-PSK / WPA Personal / WPA Passphrase). The course includes an in-depth analysis of the inner-workings of each authentication mode and EAP type that can be de[ployed in enterprise-grade Wi-Fi networks.

Other infrastructure security solutions are covered, along with Role-Based Access Control (RBAC), segmentation, VPNs, firewalls, wireless intrusion prevention and monitoring, fast secure roaming, and Wi-Fi security management.

The course also examines Wi-Fi network security vulnerabilities, attacks, audit and penetration tools, as well as wireless security policy and prevention.

Students who complete the course will acquire the necessary skills to implement and manage Wi-Fi security in the enterprise using Layer-2 and Layer-3 solutions using tools from leading manufacturers.

The CWSP course is also designed to help attendees prepare for the Certitrek CWSP-205 Certified Wireless Security Professional exam.

Who should attend this CWSP course

Completing CWSP Training and Certification is the clearest way to demonstrate competence in Enterprise Wi-Fi Wireless LAN security.

CWSP Course Pre-requisites

Delegates should have attended our CWNA course, or acquired CWNA certification prior to attending this course.

CWSP Certification

This course helps attendees prepare for the Certitrek Certified Wireless Security Professional exam (CWSP) CWSP-205. Attendees also receive their Certificate of training course attendance. The CWSP-205 exam curriculum is weighted as follows: Wireless Network Attacks and Threat Assessment: 20% Security Policy: 5% Wireless LAN Security Design and Architecture: 50% Monitoring and Management: 25% Total: 100%

Hands-on Practicals

LEVER courses usually incorporate more hands-on practical exerises and demonstrations compared with the standard Certitrek CWSP course. LEVER's CWSP course adds 6 hours of further course material covering wireless LAN security.
Incorporates five hours of additional, market-leading hands-on labs, exclusive to LEVER:

WLAN Connectivity
Client devices, WLAN access points and WLAN controllers; how client devices access the network, the authentication and encryption methods used, and how wireless data is protected:

This lab focuses on Access Point / WLAN controller and client device security, covering:
1. Secure access to the AP/controller using secure management protocols
2. Configuring multiple WLAN profiles, each with its own authentication and cipher suites including WPA/WPA2 Personal and Enterprise
3. Configuring client devices to connect to the WLAN infrastructure using secure protocols including WPA/WPA2 Personal and Enterprise
4. Creating user or group policies that provide network services to clients based on their authorisation level
5. Understanding integrated WIPS configuration, policies, and monitoring

802.1X/EAP Configuration
WPA/WPA2-Enterprise relies on secure authentication via IEEE 802.1X/EAP, often utilising enterprise directory authentication infrastructure, including RADIUS servers. This lab gives a detailed understanding of this process and the configuration details:
1. Setting up a RADIUS server and a user credential database with EAP support
2. Creating and using server certificates and installing the certificate on client devices
3. Configuring the WLAN AP/controller for 802.1X with RADIUS connectivity
4. Configuring EAP types, user credentials, and certificates on the client devices

Wireless Intrusion Prevention Systems (WIPS)
WIPS provide three key functions: security monitoring, performance monitoring and reporting. This lab focuses on security monitoring and reporting:
1. WIPS installation, licensing, adding/configuring sensors, and secure console connectivity
2. Configuring WLAN profils according to organisational security policies
3. Properly classifying authorised, unauthorised, and external/interfering access points
4. Identifying and mitigating rogue devices
5. Identifying specific attacks against the authorised WLAN infrastructure or client stations

Using Laptop-based Protocol Analysers and Spectrum Analysers
Understanding driver issues, security-related protocol analysis (authentication and encryption), and spectrum analysis enables wireless security professional to check wireless security policy compliance, policy implementation and troubleshooting:
1. Installing and configuring a WLAN discovery tool, a laptop protocol analyser, and a laptop spectrum analyser
2. Locating and analysing 2.4 GHz and 5 GHz WLANs with a WLAN discovery tool and protocol analyser
3. Capturing and analysing WPA2-Personal and Enterprise (among others) authentication sequences in a WLAN protocol analyser
4. Capturing and analysing Hotspot authentication and data traffic in a WLAN protocol analyser
5. Capturing and analysing common frame types and security elements with a WLAN protocol analyser
6. Viewing a normal RF environment, a busy RF environment, RF interference sources, and an RF attack on the WLAN in a spectrum analyser

Fast Secure Roaming (FSR / FT)
Moving quickly and securely between access points attached is a requirement of real-time mobility devices such as VoWiFi phones and mobile video devices. Understanding the standards-based and proprietary processes of a Fast Transition (FT) service helps network designers support strong security and fast roaming simultaneously:
1. Configure a WLAN infrastructure roaming scenario with multiple APs and possibly multiple controllers
2. Utilise a RADIUS server for 802.1X/EAP authentication and the WLAN infrastructure for simpler forms of security
3. Configure a client device for EAP authentication using the CCMP cipher suite
4. Configure an 802.11 protocol analyser to capture the roaming transition
5. Perform a slow BSS transition as a baseline, testing open authentication, WEP, WPA2-Personal, and WPA2-Enterprise
6. Enable fast secure roaming mechanisms within the infrastructure and on the client station and perform a fast transition
7. Conduct the same tests across a Layer-3 IP boundary as well as between controllers

Network Attacks and Auditing
Defensive network security requires an understanding of offensive attacks. Wireless security auditing should include the validation of security solutions, and understanding auditing tools is an important skill. This module is tailored to the class, and covers topics like the following:
1. Conducting authentication and encryption cracking attacks
2. Conducting simple attacks/workarounds like MAC spoofing
3. Performing basic protocol analysis and eavesdropping
4. Attempting advanced attacks like session hijacking, packet injection, replay attacks, and protocol DoS attacks

Lifetime Post-Course Support

After completing this CWSP training course, delegates receive lifetime post-training support from LEVER Technology Group PLC, to help them apply the technologies and skills they have learned with us, to provide career-long support, and to ensure they are better equipped for their future roles in IT and networking.

CWSP Training Course Content

Introduction to WLAN Security Technology

WLAN Mobile Endpoint Security Solutions

SOHO and SMB WLAN Security Technologies and Solutions

Enterprise WLAN Management and Monitoring

Enterprise WLAN Security Technology and Solutions

LEVER Technology Group PLC - Wireless Telecoms training specialists
Copyright © 1996 - 2019 LEVER Technology Group PLC, Woodhead House, Woodhead Road, Leeds, WF17 9TD, UK
Tel: +44 (0) 113 398 3300   Fax: +44 (0) 1924 442829   E-mail:
Important Notices and Privacy Statement   Maintained by http://WWW.LEVER.CO.UK

    CWSP, certified wireless security professional, training, course, uk - Enrol