## **TEXTBOOK** *CWSP Certified Wireless Security Professional Official Study Guide, Coleman, D.D., Westcott, D.A., Harkins, Wiley Publishing, 2 edition (2016)* | Week | Date | Topics | Activity/Evaluation | | ---- | ------- | -------------------------------------------------- | --------------------------------------------- | | 1 | Jan 6 | Introduction to the course. WLAN security Overview | Term-Long Project in Wireless Security Opens | | 2 | 13 | Legacy 802.11 security | | | 3 | 20 | Encryption Ciphers and Methods | | | 4 | 27 | Cont | Lab 1 – 7.5% | | 5 | Feb 3 | 802.1X/EAP Authentication | | | 6 | 10 | 802.11 Layer 2 Dynamic Encryption Key Generator | | | 7 | 17 | Cont | Lab 2 – 7.5% | | 8 | Mar 3 | **Midterm- 25%** | | | 9 | 10 | PKS Authentication | | | 10 | 17 | 802.11 Fast Secure Roaming | Lab 3 – 7.5% | | 11 | 24 | WLAN Security Infrastructure | | | 12 | 31 | WLAN RADIUS and LDAP servers | Lab 4 – 7.5% | | 13 | April 7 | Cont | Term-Long Project in Wireless Security Closes | | 14 | 14 | **Final Exam – 25%** | | |Component|Quantity|Weight per Item|Total Weight| |---|---|---|---| |Assignments|1|20%|20.0%| |Labs|4|7.5%|30.0%| |Midterm Exam|1|25%|25.0%| |Final Exam|1|25%|25.0%| |**Total**|||**100.0%**| ## **Template for Research Paper** - IEEE Conference Paper Format. Microsoft Word. - *Location:* https://www.ieee.org/conferences/publishing/templates.html - *Conference Style paper.* Use Sheridan Library to access and download IEEE conference papers that address wireless security. Read and analyze the style. - *Author:* Full name and email. - *Pages:* 5. - *Content:* - Introduction - Related Work Section (at least 10 references) - Problem Statement - System under Analysis - Existing Solutions - Discussion of the Existing Solutions - Conclusion - References