COURSE OUTLINE
ETHICAL HACKING W
IR
ELE
S S S E CU
RI
T
Y
Certified Wireless
AN
C E RT I F I E
A LY S T
Security Analyst (CWSA) CWSA
•
ET
HI G
C AL IN
H AC K
CORE-LEVEL COURSE Cost: £1,198.00 + VAT Duration: 2 days
This two-day course is COURSE OVERVIEW KEY BENEFITS
for people involved in a As wireless technologies become ever This course will give you:
more pervasive, the need to consider zzA thorough understanding of how
variety of wireless network- the risks they present should form part hackers target wireless networks and
related roles. It is designed of any information security policy. This how to protect wireless networks (and
to give you the skills you course gives you the knowledge of how clients) from attack in the real world
hackers bypass wireless security as well zzA safe classroom environment to
need to develop a more
as an understanding of the principles experiment with the tools
secure infrastructure of wireless cryptography. Once able zzDelegates leave with knowledge they
around critical data and to identify and exploit vulnerabilities, can apply outside the world of WiFi,
you will be introduced to a range of such as how public key cryptography
applications, and defend
defensive countermeasures, allowing you works
systems from unauthorised to complete the final exercise of building zzThe course culminates in a hands-on
wireless attacks. a secure wireless network to protect exercise to create a secure wireless
information assets. network using digital certificates for
authentication
THE SKILLS YOU WILL LEARN zzValuable preparation for the CREST
zz Learn how hackers and auditors Registered Penetration Tester (CRT)
alike test wireless networks for examination
vulnerabilities
zzDiscover the latest security standards
and practices in WiFi WHO SHOULD ATTEND
zzUnderstand the threats to wireless Anyone with responsibility for, or an
networks, including rogue access interest in, the security of wireless
points, denial of service (DoS) attacks networks and Wi-Fi enabled devices,
and client-side (i.e. non Access Point) including:
threats zzIT managers
zzIn-depth coverage of a comprehensive zzSystems/network administrators
“An essential course for
series of wireless security measures zzIT security professionals
those designing and and their weaknesses, including WEP zzForensic/network investigators
configuring all aspects and WPA/WPA2 (i.e. TKIP/CCMP)
of wireless networking.” and 802.1X authentication (although PREREQUISITES
CWSA Delegate WEP is outdated, understanding its Basic understanding of TCP/IP
New Vision Group Ltd flaws helps to understand why the networking:
replacements are better as well as zzAre you familiar with the OSI model?
introducing principles that underpin Can you name a layer 2 and layer 3
other security protocols). protocol?
zzUnderstand how enterprise WiFi zzCan you describe how a request
networks need not rely on pre-shared reaches a web server through
keys Ethernet, IP and TCP?
To find out if our cyber training is right for you, and to make a booking,
contact our education team on 01763 285 285 or email [email protected]
COURSE OUTLINE
ETHICAL HACKING W
IR
ELE
S S S E CU
RI
T
Y
Certified Wireless
AN
C E RT I F I E
A LY S T
Security Analyst (CWSA) CWSA
•
ET
HI G
C AL IN
H AC K
CORE-LEVEL COURSE Cost: £1,198.00 + VAT Duration: 2 days
zzWhat function does ARP SYLLABUS
perform? 1. WiFi Networks 4. 802.11l
zzHow does a system know a. Standards a. TKIP
whether or not a gateway is b. Components b. TKIP Key Management
required? c. WiFi Station Modes c. 4-way handshake
d. Channels d. Key mixing
Basic familiarity with the Windows e. Architectures e. TKIP attacks
or Linux command line, e.g. f. Frames and Types f. Client-side dictionary attack
zzWhat’s the difference between a g. Block ciphers
command and its switches? 2. WiFi Threats h. CCMP
zzCan you navigate the file system a. Monitor mode i. CCMP attacks
using commands? b. Wardriving j. WiFi Protected Setup (WPS)
zzCan you display network c. Wardriving Stations
configuration information etc.? d. Eavesdropping 5. WiFi Enterprise Security
e. ARP poisoning a. The trouble with pre-shared keys
If you are planning to do both f. Denial of Service b. EAP
the CSTA and CWSA courses, we g. Rogue Access Points c. 802.1X
recommend you take CSTA first. h. Rogue Stations d. RADIUS
i. WiFi Connection Software e. EAP methods
WHAT QUALIFICATION f. Public key cryptography
WILL I RECEIVE? 3. WiFi Security g. Certificates
Those delegates successfully a. SSID broadcast h. TLS weaknesses
passing the exam at the end b. MAC filtering i. PEAP weaknesses
of the course will be awarded c. Stream ciphers
7Safe’s Certified Wireless Security d. WEP and WEP flaws 6. Conclusions
Analyst (CWSA) qualification. e. Shared Key Authentication a. Summary
f. Café Latte attack b. Further WiFi defences
7Safe
Global Innovation
and Technology Centre
Melbourn
Herts, SG8 6DP
United Kingdom
tel: +44(0) 1763 285 285
[email protected]
www.7safe.com
To find out if our cyber training is right for you, and to make a booking,
contact our education team on 01763 285 285 or email [email protected]