What you will learn?
Understand WLAN security technologies and solutions
Implement WLAN security policies and auditing practices
Identify and mitigate layer 2/3 vulnerabilities
Secure WLAN mobile endpoints
Configure WPA/WPA2 Personal and Enterprise authentication
Understand IEEE 802.11 Authentication and Key Management (AKM)
Operate and manage secure WLAN environments effectively
Target Audience
Network security professionals
Wireless network administrators and engineers
IT professionals pursuing CWSP certification
Consultants focused on WLAN design and security
About this course
Participants will explore the latest tools and techniques for securing wireless networks, including WLAN auditing, layer 2 and layer 3 protections, 802.11i standards, WPA/WPA2 Personal and Enterprise, and Authentication and Key Management (AKM). The course also covers WLAN attack methods such as intrusion, rogue devices, and DoS attacks, and teaches mitigation using WIPS/WIDS and network management systems.
Hands-on labs, case studies, and practical implementation exercises ensure students can confidently design, deploy, and manage secure WLAN environments. This course is ideal preparation for the CWSP certification and for professionals tasked with safeguarding enterprise wireless infrastructure.
Requirements
Completion of the CWNA course or a valid CWNA certification