0% found this document useful (0 votes)
78 views

Certified Wireless Security Analyst (CWSA) : Ethical Hacking

This two-day course provides an in-depth overview of ethical hacking techniques for wireless networks. It is designed to teach attendees how hackers target and exploit vulnerabilities in wireless systems, as well as defensive strategies to secure networks. The course covers topics such as wireless standards, threats including rogue access points and denial of service attacks, and security measures like WEP, WPA, and 802.1X authentication. Attendees will learn practical skills for penetration testing wireless networks and protecting critical data, and come away with the knowledge to design and configure secure wireless infrastructures. The course is beneficial for IT managers, administrators, and security professionals responsible for wireless security.

Uploaded by

razu1234
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views

Certified Wireless Security Analyst (CWSA) : Ethical Hacking

This two-day course provides an in-depth overview of ethical hacking techniques for wireless networks. It is designed to teach attendees how hackers target and exploit vulnerabilities in wireless systems, as well as defensive strategies to secure networks. The course covers topics such as wireless standards, threats including rogue access points and denial of service attacks, and security measures like WEP, WPA, and 802.1X authentication. Attendees will learn practical skills for penetration testing wireless networks and protecting critical data, and come away with the knowledge to design and configure secure wireless infrastructures. The course is beneficial for IT managers, administrators, and security professionals responsible for wireless security.

Uploaded by

razu1234
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

COURSE OUTLINE

ETHICAL HACKING W
IR
ELE
S S S E CU
RI
T

Y
Certified Wireless

AN
C E RT I F I E

A LY S T
Security Analyst (CWSA) CWSA


ET
HI G
C AL IN
H AC K

CORE-LEVEL COURSE Cost: £1,198.00 + VAT Duration: 2 days

This two-day course is COURSE OVERVIEW KEY BENEFITS


for people involved in a As wireless technologies become ever This course will give you:
more pervasive, the need to consider zzA thorough understanding of how
variety of wireless network- the risks they present should form part hackers target wireless networks and
related roles. It is designed of any information security policy. This how to protect wireless networks (and
to give you the skills you course gives you the knowledge of how clients) from attack in the real world
hackers bypass wireless security as well zzA safe classroom environment to
need to develop a more
as an understanding of the principles experiment with the tools
secure infrastructure of wireless cryptography. Once able zzDelegates leave with knowledge they

around critical data and to identify and exploit vulnerabilities, can apply outside the world of WiFi,
you will be introduced to a range of such as how public key cryptography
applications, and defend
defensive countermeasures, allowing you works
systems from unauthorised to complete the final exercise of building zzThe course culminates in a hands-on

wireless attacks. a secure wireless network to protect exercise to create a secure wireless
information assets. network using digital certificates for
authentication
THE SKILLS YOU WILL LEARN zzValuable preparation for the CREST

zz Learn how hackers and auditors Registered Penetration Tester (CRT)


alike test wireless networks for examination
vulnerabilities
zzDiscover the latest security standards

and practices in WiFi WHO SHOULD ATTEND


zzUnderstand the threats to wireless Anyone with responsibility for, or an
networks, including rogue access interest in, the security of wireless
points, denial of service (DoS) attacks networks and Wi-Fi enabled devices,
and client-side (i.e. non Access Point) including:
threats zzIT managers

zzIn-depth coverage of a comprehensive zzSystems/network administrators


“An essential course for
series of wireless security measures zzIT security professionals
those designing and and their weaknesses, including WEP zzForensic/network investigators
configuring all aspects and WPA/WPA2 (i.e. TKIP/CCMP)
of wireless networking.” and 802.1X authentication (although PREREQUISITES
CWSA Delegate WEP is outdated, understanding its Basic understanding of TCP/IP
New Vision Group Ltd flaws helps to understand why the networking:
replacements are better as well as zzAre you familiar with the OSI model?

introducing principles that underpin Can you name a layer 2 and layer 3
other security protocols). protocol?
zzUnderstand how enterprise WiFi zzCan you describe how a request

networks need not rely on pre-shared reaches a web server through


keys Ethernet, IP and TCP?

To find out if our cyber training is right for you, and to make a booking,
contact our education team on 01763 285 285 or email [email protected]
COURSE OUTLINE

ETHICAL HACKING W
IR
ELE
S S S E CU
RI
T

Y
Certified Wireless

AN
C E RT I F I E

A LY S T
Security Analyst (CWSA) CWSA


ET
HI G
C AL IN
H AC K

CORE-LEVEL COURSE Cost: £1,198.00 + VAT Duration: 2 days

zzWhat function does ARP SYLLABUS


perform? 1. WiFi Networks 4. 802.11l
zzHow does a system know a. Standards a. TKIP
whether or not a gateway is b. Components b. TKIP Key Management
required? c. WiFi Station Modes c. 4-way handshake
d. Channels d. Key mixing
Basic familiarity with the Windows e. Architectures e. TKIP attacks
or Linux command line, e.g. f. Frames and Types f. Client-side dictionary attack
zzWhat’s the difference between a g. Block ciphers
command and its switches? 2. WiFi Threats h. CCMP
zzCan you navigate the file system a. Monitor mode i. CCMP attacks
using commands? b. Wardriving j. WiFi Protected Setup (WPS)
zzCan you display network c. Wardriving Stations
configuration information etc.? d. Eavesdropping 5. WiFi Enterprise Security
e. ARP poisoning a. The trouble with pre-shared keys
If you are planning to do both f. Denial of Service b. EAP
the CSTA and CWSA courses, we g. Rogue Access Points c. 802.1X
recommend you take CSTA first. h. Rogue Stations d. RADIUS
i. WiFi Connection Software e. EAP methods
WHAT QUALIFICATION f. Public key cryptography
WILL I RECEIVE? 3. WiFi Security g. Certificates
Those delegates successfully a. SSID broadcast h. TLS weaknesses
passing the exam at the end b. MAC filtering i. PEAP weaknesses
of the course will be awarded c. Stream ciphers
7Safe’s Certified Wireless Security d. WEP and WEP flaws 6. Conclusions
Analyst (CWSA) qualification. e. Shared Key Authentication a. Summary
f. Café Latte attack b. Further WiFi defences

7Safe
Global Innovation
and Technology Centre
Melbourn
Herts, SG8 6DP
United Kingdom
tel: +44(0) 1763 285 285 
[email protected]
www.7safe.com

To find out if our cyber training is right for you, and to make a booking,
contact our education team on 01763 285 285 or email [email protected]

You might also like