CWSP-206: CWSP Certified Wireless Security Professional

Best Seller 212 Lectures 13h 12m 6s
Prepare for your CWNP examination with our training course. The CWSP-206 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to CWNP certification exam. Pass the CWNP CWSP-206 test with flying colors.
$14.99$24.99
Curriculum For This Course

  • 1. WLAN Security Overview 1m 40s
  • 2. Where We Came From 2m 26s
  • 3. Standards Organizations 1m 31s
  • 4. ISO and the OSI 10m 25s
  • 5. ISOC Hierarchy 3m
  • 6. Wi-Fi Alliance Standards 7m 2s
  • 7. 802.11 Networking Basics Part1 1m 28s
  • 8. 802.11 Networking Basics Part2 2m 43s
  • 9. Connection Types 2m 8s
  • 10. 802.11 Security Basics 1m 54s
  • 11. Data Privacy Part1 1m 48s
  • 12. Data Privacy Part2 3m 14s
  • 13. AAA 1m 33s
  • 14. Segmentation 3m 46s
  • 15. Monitoring 1m 42s
  • 16. Policy 1m 19s
  • 17. Security History 51s
  • 18. 802.11i and WPA Part1 45s
  • 19. 802.11i and WPA Part2 1m 37s
  • 20. 802.11i and WPA Part3 2m 35s
  • 21. RSN (Robust Security Network) 54s
  • 22. Future of 802.11 Security Part1 1m 44s
  • 23. Future of 802.11 Security Part2 1m 30s
  • 24. Demo - Networking Basics 4m 45s
  • 25. Demo - Web GUI Introduction 5m 13s
  • 26. Demo - Security Options 3m 13s
  • 27. Module 01 Review 49s
  • 1. Legacy Security 48s
  • 2. Authentication 1m
  • 3. Open System Authentication 2m 31s
  • 4. WEP Encryption 4m 9s
  • 5. Shared Key Authentication 2m 26s
  • 6. More About WEP Part1 6m 5s
  • 7. More About WEP Part2 8m 58s
  • 8. Attacks Against WEP 6m 19s
  • 9. VPNs Part1 3m 26s
  • 10. VPNs Part2 6m 19s
  • 11. VPN Tunneling Protocols 1m 49s
  • 12. MAC Filters 2m 36s
  • 13. SSID Segmentation 4m 26s
  • 14. SSID Cloaking 1m 58s
  • 15. Demo - Security Associations 9m 39s
  • 16. Demo - Security Associations Part A 4m 39s
  • 17. Demo - Security Associations Part B 5m
  • 18. Demo - MAC Spoofing 6m 49s
  • 19. Module 02 Review 40s
  • 1. Encryption Ciphers and Methods 37s
  • 2. Encryption Basics 8m 18s
  • 3. Stream and Block Ciphers 6m
  • 4. WLAN Encryption Methods 3m 8s
  • 5. WEP Again 1m 2s
  • 6. TKIP Part1 6m 54s
  • 7. TKIP Part2 7m 31s
  • 8. MIC 6m 59s
  • 9. TKIP MPDU 5m 2s
  • 10. CCMP Part1 3m 49s
  • 11. CCMP Part2 4m 7s
  • 12. CCMP Part3 3m 23s
  • 13. CCMP Part4 2m 24s
  • 14. CCMP Part5 3m 45s
  • 15. WPA/WPA2 1m 15s
  • 16. Proprietary Solutions 51s
  • 17. Demo - Encryption Example 6m 27s
  • 18. Module 03 Review 23s
  • 1. 802.11 Authentication Methods 43s
  • 2. WLAN Authentication Overview 8m
  • 3. AAA 2m 36s
  • 4. Authentication 7m 11s
  • 5. Authorization 3m 20s
  • 6. Accounting 4m 45s
  • 7. 802.1X 5m 4s
  • 8. Supplicant Credentials 7m 26s
  • 9. Authentication Server Credentials 8m 2s
  • 10. EAP 4m 23s
  • 11. EAP Process 5m 50s
  • 12. Legacy EAP 3m 54s
  • 13. Strong EAP Protocols 4m 48s
  • 14. PACs 4m 46s
  • 15. Demo - Certificate Authority Server Credentials 5m 51s
  • 16. Module 04 Review 41s
  • 1. Dynamic Encryption Key Generation 1m 7s
  • 2. Dynamic WEP 5m 59s
  • 3. RSN 6m 44s
  • 4. Management Frames & RSNIE (eNotes) 6m 30s
  • 5. RSN (Cont.) 1m 11s
  • 6. Authentication and Key Management (AKM) Part1 4m 22s
  • 7. Authentication and Key Management (AKM) Part2 5m 14s
  • 8. Authentication and Key Management (AKM) Part3 43s
  • 9. Authentication and Key Management (AKM) Part4 2m 41s
  • 10. RSNA Key Hierarchy 2m 23s
  • 11. Master Session Key (MSK) 2m 23s
  • 12. 4-Way Handshake 3m 17s
  • 13. Steps of the 4 -way Handshake 51s
  • 14. Group Key Handshake 1m 7s
  • 15. PeerKey Handshake 2m
  • 16. Demo - EAP 5m 35s
  • 17. Demo - Information Elements 6m 39s
  • 18. Module 05 Review 57s
  • 1. SOHO 802.11 Security 25s
  • 2. Introduction 4m 48s
  • 3. Why a Passphrase 7m 32s
  • 4. 4-Way Handshake Again 5m 54s
  • 5. Risks of WPA/WPA2 4m 49s
  • 6. Another Risk Factor of WPA/2 3m 4s
  • 7. Wi -Fi Protected Setup (WPS) Part1 2m 32s
  • 8. Wi -Fi Protected Setup (WPS) Part2 4m 25s
  • 9. Wi -Fi Protected Setup (WPS) Part3 26s
  • 10. Wi -Fi Protected Setup (WPS) Part4 3m 34s
  • 11. Wi -Fi Protected Setup (WPS) Part5 1m 2s
  • 12. Initial WLAN Setup 1m 40s
  • 13. SOHO Best Practices 5m 56s
  • 14. Demo - Cracking Hashes 9m 37s
  • 15. Module 06 Review 39s
  • 1. Fast Secure Roaming 1m 7s
  • 2. History of 802.11 Roaming 4m 11s
  • 3. Client Roaming Thresholds 3m 2s
  • 4. AP to AP Handoff (e -notes 9m 10s
  • 5. Re -Association 2m 1s
  • 6. Types of APs 3m 9s
  • 7. RSNA Review 1m 46s
  • 8. PMKSA 7m 47s
  • 9. PMK Caching 1m 58s
  • 10. Pre -authentication 3m 29s
  • 11. Opportunistic Key Caching (OKC) 10m 1s
  • 12. Proprietary FSR 6m 3s
  • 13. FT Key Hierarchy (e -notes) 9m 8s
  • 14. FT Initial Mobility Domain Association 2m 17s
  • 15. Over the Air Fast BSS Transition (e -notes) 6m 7s
  • 16. Over the Air DS Fast BSS Transition (e - notes) 12m 25s
  • 17. 802.11K -2008 3m 51s
  • 18. L3 Roaming 10m 43s
  • 19. Mobile IP 4m 46s
  • 20. Troubleshooting 3m 35s
  • 21. Voice Personal and Voice Enterprise 4m 51s
  • 1. Wireless Security Risks 42s
  • 2. Introduction 26s
  • 3. Rogue Devices Part1 9m 12s
  • 4. Rogue Devices Part2 3m 43s
  • 5. Rogue Prevention 3m 13s
  • 6. Eavesdropping 4m 41s
  • 7. Authentication Attacks 1m 16s
  • 8. DoS 1m 11s
  • 9. L2 DoS 1m 11s
  • 10. 802.11w 53s
  • 11. MAC Spoofing 1m 48s
  • 12. Wireless Hijacking 2m 43s
  • 13. Peer -to -Peer Attacks 1m 49s
  • 14. Management Interface Exploits 2m 42s
  • 15. Physical Damage and Theft 40s
  • 16. Social Engineering 46s
  • 17. Public Access and WLAN Hotspots 38s
  • 18. Demo - Rogue Devices 4m 26s
  • 19. Demo - Public Hotspots 6m 32s
  • 20. Module 08 Review 30s
  • 1. Wireless LAN Security Auditing 19s
  • 2. Purpose of Auditing 1m 27s
  • 3. WLAN Audits Part1 1m 52s
  • 4. WLAN Audits Part2 46s
  • 5. Layer 1 Audit 5m 13s
  • 6. Layer 2 Audit 2m 13s
  • 7. Penetration Testing 3m 57s
  • 8. Wired Infrastructure Audit 3m 7s
  • 9. Social Engineering 1m 47s
  • 10. WIPS Audit 52s
  • 11. Documenting the Audit 4m 10s
  • 12. Recommendations 43s
  • 13. WLAN Security Auditing Tools 1m 32s
  • 14. Module 09 Review 23s
  • 1. Wireless Security Monitoring 45s
  • 2. WIDS/WIPS 1m 2s
  • 3. WIDS/WIPS continue 6m 23s
  • 4. Sensor Placement 3m 57s
  • 5. Example of Rogue Detection (e -notes) 8m 57s
  • 6. Device Tracking 6m 53s
  • 7. Signature Analysis 1m 4s
  • 8. Behavioral Analysis 2m 22s
  • 9. Other Types of Monitoring 5m 57s
  • 10. More on Monitoring 52s
  • 11. Module 10 Review 24s
  • 1. VPNs, Remote Access and Guest Access Services 34s
  • 2. VPN Review Part1 11m 18s
  • 3. VPN Review Part2 11m
  • 4. Remote Access Part1 6m 20s
  • 5. Remote Access Part2 7m 22s
  • 6. Module 11 Review 22s
  • 1. WLAN Security Infrastructure 39s
  • 2. WLAN Architecture 7m 35s
  • 3. Lightweight or Controller Based APs (e-notes) 8m 16s
  • 4. Other Controller Based Definitions 14m 8s
  • 5. Device Management 6m 58s
  • 6. Management Protocols 6m 49s
  • 7. Controller Communications 5m 26s
  • 8. Authorization Servers 3m 13s
  • 9. Deployment Architectures 7m 40s
  • 10. Other RADIUS Solutions 4m 48s
  • 11. RBAC 4m 18s
  • 12. Other Security Systems 6m 18s
  • 13. Module 12 Review 23s
  • 1. Wireless Security Policies 21s
  • 2. General Policy Part1 2m 13s
  • 3. General Policy Part2 4m 15s
  • 4. Policy Creation 3m 13s
  • 5. Policy Management 2m 26s
  • 6. Functional Policy 2m 52s
  • 7. Password Policy 1m 40s
  • 8. Other Policies Part1 3m 33s
  • 9. Other Policies Part2 2m 18s
  • 10. Government and Industry Regulations 6m 20s
  • 11. Module 13 Review 25s
  • 12. Course Closure 1m 47s

Hot Exams

How to Open Test Engine .dumpsqueen Files

Use FREE DumpsQueen Test Engine player to open .dumpsqueen files

DumpsQueen Test Engine

Windows

 safe checkout

Your purchase with DumpsQueen.com is safe and fast.

The DumpsQueen.com website is protected by 256-bit SSL from Cloudflare, the leader in online security.

Need Help Assistance?