CWNP CWSP-208 Certification Exam Syllabus

CWSP-208 Syllabus, Wi-Fi Security Exam Questions PDF, CWNP CWSP-208 Dumps Free, Wi-Fi Security PDF, CWSP-208 Dumps, CWSP-208 PDF, Wi-Fi Security VCE, CWSP-208 Questions PDF, CWNP Wi-Fi Security Questions PDF, CWNP CWSP-208 VCEA great way to start the CWNP Certified Wireless Security Professional (CWSP) preparation is to begin by properly appreciating the role that syllabus and study guide play in the CWNP CWSP-208 certification exam. This study guide is an instrument to get you on the same page with CWNP and understand the nature of the CWNP Wi-Fi Security exam.

Our team of experts has composed this CWNP CWSP-208 exam preparation guide to provide the overview about CWNP Wireless Security Professional exam, study material, sample questions, practice exam and ways to interpret the exam objectives to help you assess your readiness for the CWNP CWSP exam by identifying prerequisite areas of knowledge. We recommend you to refer the simulation questions and practice test listed in this guide to determine what type of questions will be asked and the level of difficulty that could be tested in the CWNP Wi-Fi Security certification exam.

CWNP CWSP-208 Exam Overview:

Exam Name Wireless Security Professional
Exam Number CWSP-208 CWSP
Exam Price $349.99 USD
Duration 90 minutes
Number of Questions 60
Passing Score 70%
Recommended Training CWSP Learning Resources for Self-Study
Live Network Certification Training Class
Exam Registration Prometric
Sample Questions CWNP CWSP-208 Sample Questions
Practice Exam CWNP Certified Wireless Security Professional Practice Test

CWNP CWSP-208 Exam Topics:

Section Objectives

Security Policy - 10%

WLAN security Requirements - Evaluate and incorporate business, technical, and applicable regulatory policies (for example, PCI-DSS, HIPAA, GDPR, etc.)
- Identify appropriate stakeholders
- Review client devices and applications
- Review WLAN infrastructure devices
WLAN security policies - Translate security requirements to high-level policy statements
- Advise on the creation of WLAN security policies based on industry standards
- Advise on the implementation of security policy lifecycle management
- Ensure appropriate approval and support for all policies
Ensure proper training is administered for all stakeholders related to security policies and ongoing security awareness  

Vulnerabilities, Threats, and Attacks - 30%

Identify potential vulnerabilities and threats to determine the impact on the WLAN and supporting systems and verify, mitigate, and remediate them - Use information sources to identify the latest vulnerabilities related to a WLAN including online repositories containing CVEs
- Determine the risk and impact of identified vulnerabilities
- Select appropriate actions to mitigate threats exposed by vulnerabilities
  • Review and adjust device configurations to ensure conformance with security policy
  • Implement appropriate code modifications, patches and upgrades
  • Quarantine unrepaired/compromised systems
  • Examine logs and network traffic where applicable

- Explain common WLAN attacks including eavesdropping, man-in-the-middle, cracking, phishing, and other social engineering attacks
- Identify methods to detect common WLAN attacks including eavesdropping, man in-the-middle, cracking, phishing, and other social engineering attacks
- Identify methods to mitigate common WLAN attacks including eavesdropping, man in-the-middle, cracking, phishing, and other social engineering attacks
- Identify deprecated 802.11 and Wi-Fi Alliance security solutions (WEP, WPA, TKIP, RC4)
- Implement security testing procedures to identify weaknesses in the WLAN

  • Use appropriate penetration testing processes including scope definition, information gathering, scanning, attack, and documentation procedures
  • Select and use security testing tools including project documentation, scanners, hardware tools, Kali Linux tools, protocol analyzers, and WLAN auditing tools (software and hardware)

- Implement network monitoring to identify attacks and potential vulnerabilities

  • Use appropriate tools for network monitoring including centralized monitoring, distributed monitoring, and Security Information Event Management (SIEM) systems
  • Implement mobile (temporary), integrated and overlay WIDS/WIPS solutions to monitor security events
Describe and perform risk analysis and risk mitigation procedures - Perform asset management
- Calculate risk ratings
- Estimate loss expectancy
- Develop risk management plans for WLANs

WLAN Security Design and Architecture - 50%

Select the appropriate security solution for a given implementation and ensure it is installed and configured according to policy requirements

- Select and implement appropriate authentication solutions

  • WPA2/WPA3 Personal/SAE
  • WPA2/WPA3-Enterprise
  • WPA3-Enterprise 192-Bit
  • 802.1X
  • RADIUS
  • Understand the capabilities of EAP methods including EAP-TLS, EAP-TTLS and PEAP
  • Guest access

- Select and implement appropriate encryption solutions

  • Differentiate encryption methods and concepts
  • CCMP, GCMP, and AES
  • SAE
  • 192-bit modes
  • Opportunistic Wireless Encryption (OWE)
  • Virtual Private Network (VPN)

- Select and implement wireless monitoring solutions

  • Wireless Intrusion Prevention System (WIPS) - overlay and integrated
  • Laptop-based monitoring with protocol and spectrum analyzers

- Understand and explain 802.11 Authentication and Key Management (AKM) components and processes

  • Encryption keys and key hierarchies
  • Handshakes and exchanges (4-way, SAE, OWE, FT)
  • Pre-shared keys
  • Enterprise methods
  • RSN security
  • WPA, WPA2, and WPA3
  • RSN Override vs. WPA3 Transition Mode
Implement or recommend appropriate wired security configurations to support the WLAN - Physical port security in Ethernet switches
- Network segmentation, VLANs, and layered security solutions
- Tunneling protocols and connections
- Access Control Lists (ACLs)
- Firewalls
Implement authentication and security services - Role-Based Access Control (RBAC)
- Certificate Authorities (CAs) and Public Key Infrastructure (PKI)
- AAA Servers
- Client onboarding
- Network Access Control (NAC)
- BYOD and MDM
Implement secure transitioning (roaming) solutions - 802.11r Fast BSS Transition (FT)
- Opportunistic Key Caching (OKC)
- Pre-Shared Key (PSK) - standard and per-user
Secure public access and/or open networks - Guest access
- Peer-to-peer connectivity
- Captive portals
- Wi-Fi Certified Passpoint/Open Roaming
- OWE
Implement preventative measures required for common vulnerabilities associated with wireless infrastructure devices and avoid weak security solutions - Weak/default passwords
- Misconfiguration
- Firmware/software updates
- HTTP-based administration interface access
- Telnet-based administration interface access
- Older SNMP protocols such as SNMPv1 and SNMPv2

Security Lifecycle Management - 10%

Understand and implement management within the security lifecycle of identify, assess, protect, and monitor - Identify technologies being introduced to the WLAN
- Assess security requirements for new technologies
- Implement appropriate protective measures for new technologies and validate the security of the measures
- Monitor and audit the new technologies for security compliance (Security Information Event Management (SIEM), portable audits, infrastructure-based audits, WIPS/WIDS)
Use effective change management procedures including documentation, approval, and notifications  
Use information from monitoring solutions for load observation and forecasting of future requirements to comply with security policy  
Implement appropriate maintenance procedures including license management, software/code upgrades, and configuration management  
Implement effective auditing procedures to perform audits, analyze results, and generate reports - User interviews
- Vulnerability scans
- Reviewing access controls
- Penetration testing
- System log analysis
- Report findings to management and support professionals as appropriate

CWNP CWSP Exam Description:

The CWSP certification is a professional level wireless LAN certification for the CWNP Program. To earn a CWSP certification, you must hold a current and valid CWNA credential. You must take the CWSP exam at a Prometric Testing Center and pass with a 70% or higher. Instructors must pass with a 80% or higher. However you choose to prepare for the CWSP exam, you should start with the exam objectives, which cover the full list of skills tested on the exam.

Rating: 4.9 / 5 (75 votes)