Certified Wireless Network Professional (CWNP)
Certified Wireless Security Professional (CWSP)
Credential: Certified Wireless Security Professional (CWSP)
Credentialing Agency: Certified Wireless Network Professional (CWNP)
Renewal Period: 3 years
The Certified Wireless Security Professional (CWSP) is a professional level certification for network engineers who seek to establish their expertise in enterprise Wi-Fi security. The CWSP certification will advance a candidate's career by ensuring they have the skills to successfully secure enterprise Wi-Fi networks from hackers, no matter which brand of Wi-Fi gear an organization deploys. Candidates should be able to assess the vulnerability of a network and help prevent attacks before they happen, know how to perform WLAN security audits and implement compliance solutions, and have experience setting up Wireless Intrusion Prevention Systems (WISPS). Candidates must have a current CWNA credential to take the CWSP exam.
More information can be found on the certifying agency's website.
Certified Wireless Security Professional (CWSP)
Eligibility Requirements (View Details)
- Credential Prerequisite: CWNA
- Experience
- Education
- Training
- Membership
- Other
- Fee
Note: This credential may have multiple options for becoming eligible. Listed are the minimum requirements based on the minimum degree required.
To view other options, see the Eligibility tab.
Exam Requirements (View Details)
- Exam
- Written Exam
- Oral Exam
- Practical Exam
- Performance Assessment
Renewal Period: 3 years
- Continuing Education
- Exam
- Continuing Education OR Exam
- Fee
- Other
Certified Wireless Network Professional (CWNP)
2224 Sedwick Drive
Suite 102
Durham, NC 27713
Phone: (866) 438-2963
Fax: (919) 287-2952
Email: customercare@cwnp.com
-
Wireless Network Attacks and Threat Assessment (20%)
-
Describe general network attacks common to wired and wireless networks, including DoS, phishing, protocol weaknesses and configuration error exploits.
-
Recognize common attacks and describe their impact on WLANs, including PHY and MAC DoS, hijacking, unauthorized protocol analysis and eavesdropping, social engineering, man-in-themiddle, authentication and encryption cracks and rogue hardware.
-
Execute the preventative measures required for common vulnerabilities on wireless infrastructure devices, including weak/default passwords on wireless infrastructure equipment and misconfiguration of wireless infrastructure devices by administrative staff.
-
Describe and perform risk analysis and risk mitigation procedures, including asset management, risk ratings, loss expectancy calculations and risk management planning.
-
Explain and demonstrate the security vulnerabilities associated with public access or other unsecured wireless networks, including the use of a WLAN for spam transmission, malware injection, information theft, peer-to-peer attacks and Internet attacks.
-
Security Policy (5%)
-
Explain the purpose and goals of security policies including password policies, acceptable use policies, WLAN access policies, personal device policies, device management (APs, infrastructure devices and clients) and security awareness training for users and administrators.
-
Summarize the security policy criteria related to wireless public access network use including user risks related to unsecured access and provider liability.
-
Describe how devices and technology used from outside an organization can impact the security of the corporate network including topics like BYOD, social networking and general MDM practices.
-
Wireless LAN Security Design and Architecture (50%)
-
Describe how wireless network security solutions may vary for different wireless network implementations including small businesses, home offices, large enterprises, public networks and remote access.
-
Understand and explain 802.11 Authentication and Key Management (AKM) components and processes including encryption keys, handshakes and pre-shared key management.
-
Define and differentiate among the 802.11-defined secure networks, including pre-RSNA security, Transition Security Networks (TSN) and Robust Security Networks (RSN) and explain the relationship of these networks to terms including RSNA, WPA and WPA2.
-
Identify the purpose and characteristics of IEEE 802.1X and EAP and the processes used including EAP types (PEAP, EAP-TLS, EAP-TTLS, EAP-FAST and EAP-SIM), AAA servers (RADIUS) and certificate management.
-
Recognize and understand the common uses of VPNs in wireless networks, including remote APs, VPN client access, WLAN controllers and cloud architectures.
-
Describe centrally-managed client-side security applications, including VPN client software and policies, personal firewall software, mobile device management (MDM) and wireless client utility software.
-
Describe centrally-managed client-side security applications, including VPN client software and policies, personal firewall software, mobile device management (MDM) and wireless client utility software
-
Explain the role, importance, and limiting factors of VLANs and network segmentation in an 802.11 WLAN infrastructure.
-
Understand additional security features in WLAN infrastructure and access devices, including management frame protection, Role-Based Access Control (RBAC), Fast BSS transition (preauthentication and OKC), physical security methods and Network Access Control (NAC).
-
Explain the purpose, methodology, features, and configuration of guest access networks and BYOD support, including segmentation, guest management, captive portal authentication and device management.
-
Monitoring, Management, and Tracking (25%)
-
Explain the importance of ongoing WLAN monitoring and the necessary tools and processes used as well as the importance of WLAN security audits and compliance reports.
-
Understand how to use protocol and spectrum analyzers to effectively evaluate secure wireless networks including 802.1X authentication troubleshooting, location of rogue security devices and identification of non-compliant devices.
-
Understand the common features and components of a Wireless Intrusion Prevention Systems (WIPS) and how they are used in relation to performance, protocol, spectrum and security analysis.
-
Describe the different types of WLAN management systems and their features, including network discovery, configuration management, firmware management, audit management, policy enforcement, rogue detection, network monitoring, user monitoring, event alarms and event notifications.
-
Describe and implement compliance monitoring, enforcement, and reporting. Topics include industry requirements, such as PCI-DSS and HIPAA, and general government regulations.
There are a number of resources available to help you prepare for the Certified Wireless Security Professional (CWSP) examination:
Certified Wireless Security Professional (CWSP)
Renewal Period: 3 years
The Certified Wireless Security Professional (CWSP) credential has the following recertification information:
-
The CWSP certification is valid for three (3) years. To recertify, one must have a current CWNA credential and pass the current CWSP exam, or earn the CWNE certification. By passing the CWSP exam, the CWNA certificate will be renewed for an another three years. Additional information about recertification can be found on the CWNP website.
MOS is Military Occupational Specialty
ASI is Additional Skill Identifier
WOMOS is Warrant Officer Military Occupational Specialty
Bright Outlook – new job opportunities are very likely in the future for this job
Registered Apprenticeship
This is an official U.S. Navy website
Updated: October 16, 2019
Federal Occupations Table Legend
Related As
The federal occupations shown in this table are related to this credential in one of three ways: Most, Some, or Other.
MOST
This credential is directly related to most of the major duties associated with the federal occupation (at least 80%). Note that the credential may require additional education, training or experience before you are eligible for it.
SOME
This credential is related to some tasks associated with the duties of the federal occupation (related 80% to at least one or more critical tasks but less than 80% of all of the entire military occupation). Note that the credential may require additional education, training or experience before you are eligible for it.
OTHER
This credential is related to this federal occupation, but is more advanced or specialized and therefore will most likely require additional education, training, or experience.
Civilian Occupations Table Legend
Bright Outlook
The Bright Outlook icon indicates that new job opportunities are very likely in the future for this job.
Registered Apprenticeship
The Registered Apprenticeship icon indicates that this job has an apprenticeship program registered with the U.S. Department of Labor.
Local Salary Information
Click the links in this column to go to the external link My Next Move for Veterans web site to view salary and employment information for the job.
Top