Cisco Training Courses

Cisco Training Courses

Insoft has been serving IT industry with authorized Cisco courses training, since 2010. Find all the relevant information on Cisco training on this page.

View More

Cisco Certifications

Experience a blended learning approach that combines the best of instructor-led training and self-paced e-learning to help you prepare for your certification exam.

View More

Cisco Learning Credits

Cisco Learning Credits (CLCs) are prepaid training vouchers redeemed directly with Cisco that make planning for your success easier when purchasing Cisco products and services.

Have CLCs and want to redeem them?

Cisco Continuing Education

The Cisco Continuing Education Program offers all active certification holders flexible options to recertify by completing a variety of eligible training items.

View More

Cisco U

Cisco U. is customized to achieve your learning needs as this provides learning paths that includes wide range of topics, including CCNA, Cloud and Network Automation Essentials.

Browse Catalogue

Cisco Business Enablement

The Cisco Business Enablement Partner Program focuses on sharpening the business skills of Cisco Channel Partners and customers.

View More

Fortinet Technical Certifications

Insoft Services´ training capabilities rely on the excellence of our exclusive Fortinet Certified Trainers (FCT). We are dedicated to providing high-quality training to Fortinet Customers and Partners.

View More

Fortinet Technical Courses

Insoft is recognised as Fortinet Authorized Training Center in selected locations across EMEA.

View More

ATC Status

Check our ATC Status across selected countries in Europe.

View More

Fortinet Services Packages

Insoft Services has developed a specific solution to streamline and simplify the process of installing or migrating to Fortinet Products.

Browse Packages

Prepforce Bootcamp

The only comprehensive source available today to prepare for Fortinet NSE 8 certification globally.

View More

Microsoft Training

Insoft Services provides Microsoft training in EMEAR. We provide Microsoft technical training and certification courses that are led by world-class instructors.

View More

Technical Training

The evolution of Extreme Networks Technical Training provides a comprehensive progressive pathway from Associate to Professional accreditation.

View More

ATP Accreditation

As an authorised training partner (ATP), Insoft Services ensures that you receive the highest standards of education available.

View More

What we do

Through our global presence and partner ecosystem, we provide strategic IT consulting services to align IT services with customers' business goals.

View More

 

We are pleased to launch pre-scoped Enterprise Networking Consulting Packages, our ready-made solutions, tailored to ensure efficiency and cost containment.

 

View More

 

We specialize in the deployment of vendor-specific automation tools as well as open-source and vendor-independent solutions, that can be tuned in accordance with the business needs of a specific organization.

 

View More

 

We provide comprehensive IoT consultancy, deployment and support solutions for businesses that want to launch or improve their use of connected technologies.

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

 

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

 

View More
Cisco Training Courses

 

We provide the highest level of expertise on Cisco consultancy services, that target audits of your current network and implementing updates for improved operational performance, secure data and compliant systems.

View More

 

We provide the highest level of expertise on Fortinet consultancy services that target audits of your current network and implementing updates for improved operational performance, secure data and compliant systems.

View More

 

Our team can help enterprises, get the most value from Extreme products and services following our predefined value-added packages or custom ones that fits business needs.

 

View More

 

TXOne Networks provides cybersecurity solutions that ensure the reliability and safety of ICS and OT environments through the OT zero trust methodology protecting assets for their entire life cycle.

 

View More

About Us

Our training portfolio includes a wide range of IT training from IP providers, including Cisco, Extreme Networks, Fortinet, Microsoft, to name a few, in EMEA.

View More

CWSP – Certified Wireless Security Professional

Contact Us

We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.

Data Protection & Privacy

I consent to receive emails and/or calls from Insoft Services related to the Insoft Services´ products and services.
I acknowledge that my data will be collected and processed as described in the Insoft Services privacy policy.

Close

CWSP – Certified Wireless Security Professional

Enroll Now
CWSP – Certified Wireless Security Professional
Duration
5 Days
Delivery
(Online and onsite)
Price
Price Upon Request

The Wireless LAN Security course consists of hands on learning using the latest enterprise wireless LAN security and auditing equipment. This course addresses in detail the most up-to-date WLAN intrusion and DoS tools and techniques, functionality of the 802.11i amendment to the 802.11 standard, the inner-workings of each EAP type used with wireless LANs today, and every class and type of WLAN security solution available on the market, from wireless intrusion prevention systems to wireless network management systems.

Students who complete the course will acquire the necessary skills for implementing and managing wireless security in the enterprise by creating layer2 and layer3 hardware and software solutions with tools from the industry leading manufacturers.

This course is excellent preparation for the challenging CWSP Certification, and includes practice exams and “Exam Cram” sessions. It is also very hands-on intensive, roughly 50% hands-on, with lots of time to get your hands on real equipment to perform actual Site Survey work.

This intensive course covers all that is required to prepare for the CWNA Certification, including:

  • hands-on training
  • Official CWSP practice test questions
  • Exam voucher for the CWSP Certification Exam (# PW0-204)
  • Mentor support after class by our Wireless Expert team

It also ensures that students leave with real hands on skills. Hands-on exercises include the following:

  • WLAN Controller Security
  • Wireless Intrusion Prevention Systems (WIPS)
  • WLAN infrastructure or client stations
  • Using Laptop Analyzers
  • Fast Secure Roaming

During this course, you will develop skills and knowledge on the following objectives:

  • WLAN Discovery Techniques
  • Intrusion and Attack Techniques
  • 802.11 Protocol Analysis
  • Wireless Intrusion Prevention Systems (WIPS) Implementation
  • Layer 2 and 3 VPNs used over 802.11 networks
  • Enterprise/SMB/SOHO/Public-Network Security design models
  • Managed Endpoint Security Systems802.11 Authentication and Key Management Protocols
  • Enterprise/SMB/SOHO/Public-Network Security Solution Implmentation
  • Building Robust Security Networks from the ground up
  • Fast BSS Transition (aka. Fast/Secure Roaming) Techniques
  • Thorough coverage of all 802.1X/EAP types used in WLANs
  • Wireless LAN Management Systems (WNMS)
  • Authentication Infrastructure Design Models
  • Using Secure Applications
  • 802.11 Design Architectures
  • Implementing a Thorough Wireless Security Policy

Hands-On Lab Exercises:

WLAN Controller Security

  • Secure access to the WLAN controller using secure management protocols
  • Configuring multiple WLAN profiles, each with its own authentication and cipher suites including WPA/WPA2 Personal and Enterprise
  • Configuring the WLAN controller for RADIUS connectivity and authentication
  • Client station connectivity to the controller – including DHCP and browsing
  • Integrated rogue device discovery

Wireless Intrusion Prevention Systems (WIPS)

  • WIPS installation, licensing, adding/configuring sensors, and secure console connectivity
  • Configuration according to organizational policy
  • Properly classifying authorized, unauthorized, and external/interfering access points
  • Identifying and mitigating rogue devices
  • Identifying specific attacks against the authorized WLAN infrastructure or client stations

Using Laptop Analyzers

  • Installing and configuring a WLAN discovery tool
  • Installing, licensing, and configuring a laptop protocol analyzer
  • Installing, licensing, and configuring a laptop spectrum analyzer
  • Locating and analyzing 2.4 GHz and 5 GHz WLANs with a WLAN discovery tool
  • Locating and analyzing 2.4 GHz and 5 GHz WLANs with a WLAN protocol analyzer
  • Capturing and analyzing a WPA2-Personal authentication in a WLAN protocol analyzer
  • Capturing and analyzing a WPA2-Enterprise authentication in a WLAN protocol analyzer
  • Capturing and analyzing Hotspot authentication and data traffic in a WLAN protocol analyzer
  • Capturing and analyzing Beacons, Probe Requests, Probe Responses, and Association Requests with a WLAN protocol analyzer
  • Viewing a normal RF environment, a busy RF environment, and an RF attack on the WLAN in a spectrum analyzer

Fast Secure Roaming

  • Configure a WLAN infrastructure with two controllers and two APs per controller. Configure APs for specific power and channel settings
  • Install and configure a RADIUS server for PEAP
  • Configure both controllers and an authorized client device for PEAP authentication using the CCMP cipher suite
  • Configure an 802.11 protocol analyzer to capture the BSS transition
  • Perform a slow BSS transition within a controller as a baseline
  • Enable FSR mechanisms within controllers and the client station
  • Perform a fast BSS transition within a controller as a comparison
  • Perform a slow BSS transition between controllers as a baseline
  • Perform a fast BSS transition (if vendor FSR mechanisms permit) between controllers as a comparison

Introduction to WLAN Security Technology

  • Security policy
  • Security concerns
  • Security auditing practices
  • Application layer vulnerabilities and analysis
  • Data Link layer vulnerabilities and analysis
  • Physical layer vulnerabilities and analysis
  • 802.11 security mechanisms
  • Wi-Fi Alliance security certifications

Small Office / Home Office WLAN Security Technology and Solutions

  • WLAN discovery equipment and utilities
  • Legacy WLAN security methods, mechanisms, and exploits
  • Appropriate SOHO security

WLAN Mobile Endpoint Security Solutions

  • Personal-class mobile endpoint security
  • Enterprise-class mobile endpoint security
  • User-accessible and restricted endpoint policies
  • VPN technology overview

Branch Office / Remote Office WLAN Security Technology and Solutions

  • General vulnerabilities
  • Preshared Key security with RSN cipher suites
  • Passphrase vulnerabilities
  • Passphrase entropy and hacking tools
  • WPA/WPA2 Personal – how it works
  • WPA/WPA2 Personal – configuration
  • Wi-Fi Protected Setup (WPS)
  • Installation and configuration of WIPS, WNMS, and WLAN controllers to extend enterprise security policy to remote and branch offices

Enterprise WLAN Management and Monitoring

  • Device identification and tracking
  • Rogue device mitigation
  • WLAN forensics
  • Enterprise WIPS installation and configuration
  • Distributed protocol analysis
  • WNMS security features
  • WLAN controller security feature sets

Enterprise WLAN Security Technology and Solutions

  • Robust Security Networks (RSN)
  • WPA/WPA2 Enterprise – how it works
  • WPA/WPA2 Enterprise – configuration
  • IEEE 802.11 Authentication and Key Management (AKM)
  • 802.11 cipher suites
  • Use of authentication services (RADIUS, LDAP) in WLANs
  • User profile management (RBAC)
  • Public Key Infrastructures (PKI) used with WLANs
  • Certificate Authorities and x.509 digital certificates
  • RADIUS installation and configuration
  • 802.1X/EAP authentication mechanisms
  • 802.1X/EAP types and differences
  • 802.11 handshakes
  • Fast BSS Transition (FT) technologies

This intensive, 5 day course is intended for network and system administrators, consultants and engineers that need to support Wireless LAN deployments.

It also is a great course for all infrastructure security professionals

The Following prerequisite knowledge and skills are suggested prior to attending the CWSP Course:

  • CWNA Certification or the equivalent in knowledge and experience.
  • Note that CWSP Certification does require that the candidate pass the CWNA certification exam (PW0-104) as well as the CWSP certification exam (PW0-204) in order to achieve certified status.
The Wireless LAN Security course consists of hands on learning using the latest enterprise wireless LAN security and auditing equipment. This course addresses in detail the most up-to-date WLAN intrusion and DoS tools and techniques, functionality of the 802.11i amendment to the 802.11 standard, the inner-workings of each EAP type used with wireless LANs today, and every class and type of WLAN security solution available on the market, from wireless intrusion prevention systems to wireless network management systems. Students who complete the course will acquire the necessary skills for implementing and managing wireless security in the enterprise by creating layer2 and layer3 hardware and software solutions with tools from the industry leading manufacturers. This course is excellent preparation for the challenging CWSP Certification, and includes practice exams and “Exam Cram” sessions. It is also very hands-on intensive, roughly 50% hands-on, with lots of time to get your hands on real equipment to perform actual Site Survey work. This intensive course covers all that is required to prepare for the CWNA Certification, including:
  • hands-on training
  • Official CWSP practice test questions
  • Exam voucher for the CWSP Certification Exam (# PW0-204)
  • Mentor support after class by our Wireless Expert team
It also ensures that students leave with real hands on skills. Hands-on exercises include the following:
  • WLAN Controller Security
  • Wireless Intrusion Prevention Systems (WIPS)
  • WLAN infrastructure or client stations
  • Using Laptop Analyzers
  • Fast Secure Roaming

During this course, you will develop skills and knowledge on the following objectives:

  • WLAN Discovery Techniques
  • Intrusion and Attack Techniques
  • 802.11 Protocol Analysis
  • Wireless Intrusion Prevention Systems (WIPS) Implementation
  • Layer 2 and 3 VPNs used over 802.11 networks
  • Enterprise/SMB/SOHO/Public-Network Security design models
  • Managed Endpoint Security Systems802.11 Authentication and Key Management Protocols
  • Enterprise/SMB/SOHO/Public-Network Security Solution Implmentation
  • Building Robust Security Networks from the ground up
  • Fast BSS Transition (aka. Fast/Secure Roaming) Techniques
  • Thorough coverage of all 802.1X/EAP types used in WLANs
  • Wireless LAN Management Systems (WNMS)
  • Authentication Infrastructure Design Models
  • Using Secure Applications
  • 802.11 Design Architectures
  • Implementing a Thorough Wireless Security Policy

Hands-On Lab Exercises:

WLAN Controller Security

  • Secure access to the WLAN controller using secure management protocols
  • Configuring multiple WLAN profiles, each with its own authentication and cipher suites including WPA/WPA2 Personal and Enterprise
  • Configuring the WLAN controller for RADIUS connectivity and authentication
  • Client station connectivity to the controller – including DHCP and browsing
  • Integrated rogue device discovery

Wireless Intrusion Prevention Systems (WIPS)

  • WIPS installation, licensing, adding/configuring sensors, and secure console connectivity
  • Configuration according to organizational policy
  • Properly classifying authorized, unauthorized, and external/interfering access points
  • Identifying and mitigating rogue devices
  • Identifying specific attacks against the authorized WLAN infrastructure or client stations

Using Laptop Analyzers

  • Installing and configuring a WLAN discovery tool
  • Installing, licensing, and configuring a laptop protocol analyzer
  • Installing, licensing, and configuring a laptop spectrum analyzer
  • Locating and analyzing 2.4 GHz and 5 GHz WLANs with a WLAN discovery tool
  • Locating and analyzing 2.4 GHz and 5 GHz WLANs with a WLAN protocol analyzer
  • Capturing and analyzing a WPA2-Personal authentication in a WLAN protocol analyzer
  • Capturing and analyzing a WPA2-Enterprise authentication in a WLAN protocol analyzer
  • Capturing and analyzing Hotspot authentication and data traffic in a WLAN protocol analyzer
  • Capturing and analyzing Beacons, Probe Requests, Probe Responses, and Association Requests with a WLAN protocol analyzer
  • Viewing a normal RF environment, a busy RF environment, and an RF attack on the WLAN in a spectrum analyzer

Fast Secure Roaming

  • Configure a WLAN infrastructure with two controllers and two APs per controller. Configure APs for specific power and channel settings
  • Install and configure a RADIUS server for PEAP
  • Configure both controllers and an authorized client device for PEAP authentication using the CCMP cipher suite
  • Configure an 802.11 protocol analyzer to capture the BSS transition
  • Perform a slow BSS transition within a controller as a baseline
  • Enable FSR mechanisms within controllers and the client station
  • Perform a fast BSS transition within a controller as a comparison
  • Perform a slow BSS transition between controllers as a baseline
  • Perform a fast BSS transition (if vendor FSR mechanisms permit) between controllers as a comparison

Introduction to WLAN Security Technology

  • Security policy
  • Security concerns
  • Security auditing practices
  • Application layer vulnerabilities and analysis
  • Data Link layer vulnerabilities and analysis
  • Physical layer vulnerabilities and analysis
  • 802.11 security mechanisms
  • Wi-Fi Alliance security certifications

Small Office / Home Office WLAN Security Technology and Solutions

  • WLAN discovery equipment and utilities
  • Legacy WLAN security methods, mechanisms, and exploits
  • Appropriate SOHO security

WLAN Mobile Endpoint Security Solutions

  • Personal-class mobile endpoint security
  • Enterprise-class mobile endpoint security
  • User-accessible and restricted endpoint policies
  • VPN technology overview

Branch Office / Remote Office WLAN Security Technology and Solutions

  • General vulnerabilities
  • Preshared Key security with RSN cipher suites
  • Passphrase vulnerabilities
  • Passphrase entropy and hacking tools
  • WPA/WPA2 Personal – how it works
  • WPA/WPA2 Personal – configuration
  • Wi-Fi Protected Setup (WPS)
  • Installation and configuration of WIPS, WNMS, and WLAN controllers to extend enterprise security policy to remote and branch offices

Enterprise WLAN Management and Monitoring

  • Device identification and tracking
  • Rogue device mitigation
  • WLAN forensics
  • Enterprise WIPS installation and configuration
  • Distributed protocol analysis
  • WNMS security features
  • WLAN controller security feature sets

Enterprise WLAN Security Technology and Solutions

  • Robust Security Networks (RSN)
  • WPA/WPA2 Enterprise – how it works
  • WPA/WPA2 Enterprise – configuration
  • IEEE 802.11 Authentication and Key Management (AKM)
  • 802.11 cipher suites
  • Use of authentication services (RADIUS, LDAP) in WLANs
  • User profile management (RBAC)
  • Public Key Infrastructures (PKI) used with WLANs
  • Certificate Authorities and x.509 digital certificates
  • RADIUS installation and configuration
  • 802.1X/EAP authentication mechanisms
  • 802.1X/EAP types and differences
  • 802.11 handshakes
  • Fast BSS Transition (FT) technologies

This intensive, 5 day course is intended for network and system administrators, consultants and engineers that need to support Wireless LAN deployments.

It also is a great course for all infrastructure security professionals

The Following prerequisite knowledge and skills are suggested prior to attending the CWSP Course:

  • CWNA Certification or the equivalent in knowledge and experience.
  • Note that CWSP Certification does require that the candidate pass the CWNA certification exam (PW0-104) as well as the CWSP certification exam (PW0-204) in order to achieve certified status.