## **TEXTBOOK**
*CWSP Certified Wireless Security Professional Official Study Guide, Coleman, D.D., Westcott, D.A., Harkins, Wiley Publishing, 2 edition (2016)*
| Week | Date | Topics | Activity/Evaluation |
| ---- | ------- | -------------------------------------------------- | --------------------------------------------- |
| 1 | Jan 6 | Introduction to the course. WLAN security Overview | Term-Long Project in Wireless Security Opens |
| 2 | 13 | Legacy 802.11 security | |
| 3 | 20 | Encryption Ciphers and Methods | |
| 4 | 27 | Cont | Lab 1 – 7.5% |
| 5 | Feb 3 | 802.1X/EAP Authentication | |
| 6 | 10 | 802.11 Layer 2 Dynamic Encryption Key Generator | |
| 7 | 17 | Cont | Lab 2 – 7.5% |
| 8 | Mar 3 | **Midterm- 25%** | |
| 9 | 10 | PKS Authentication | |
| 10 | 17 | 802.11 Fast Secure Roaming | Lab 3 – 7.5% |
| 11 | 24 | WLAN Security Infrastructure | |
| 12 | 31 | WLAN RADIUS and LDAP servers | Lab 4 – 7.5% |
| 13 | April 7 | Cont | Term-Long Project in Wireless Security Closes |
| 14 | 14 | **Final Exam – 25%** | |
|Component|Quantity|Weight per Item|Total Weight|
|---|---|---|---|
|Assignments|1|20%|20.0%|
|Labs|4|7.5%|30.0%|
|Midterm Exam|1|25%|25.0%|
|Final Exam|1|25%|25.0%|
|**Total**|||**100.0%**|
## **Template for Research Paper**
- IEEE Conference Paper Format. Microsoft Word.
- *Location:* https://www.ieee.org/conferences/publishing/templates.html
- *Conference Style paper.* Use Sheridan Library to access and download IEEE conference papers that address wireless security. Read and analyze the style.
- *Author:* Full name and email.
- *Pages:* 5.
- *Content:*
- Introduction
- Related Work Section (at least 10 references)
- Problem Statement
- System under Analysis
- Existing Solutions
- Discussion of the Existing Solutions
- Conclusion
- References