CWSP-206: CWSP Certified Wireless Security Professional
Your CWNP CWSP-206 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the CWSP-206 certification test. Ace your CWNP CWSP-206 at the first attempt and obtain the CWSP Certified Wireless Security Professional credential with ease.
Curriculum for CWSP-206 Video Course
Course Introduction
Video Name | Time | |
---|---|---|
1. Introduction | 01:35 | |
2. Instructor Introduction | 01:42 |
Video Name | Time | |
---|---|---|
1. WLAN Security Overview | 01:40 | |
2. Where We Came From | 02:26 | |
3. Standards Organizations | 01:31 | |
4. ISO and the OSI | 10:25 | |
5. ISOC Hierarchy | 03:00 | |
6. Wi-Fi Alliance Standards | 07:02 | |
7. 802.11 Networking Basics Part1 | 01:28 | |
8. 802.11 Networking Basics Part2 | 02:43 | |
9. Connection Types | 02:08 | |
10. 802.11 Security Basics | 01:54 | |
11. Data Privacy Part1 | 01:48 | |
12. Data Privacy Part2 | 03:14 | |
13. AAA | 01:33 | |
14. Segmentation | 03:46 | |
15. Monitoring | 01:42 | |
16. Policy | 01:19 | |
17. Security History | 00:51 | |
18. 802.11i and WPA Part1 | 00:45 | |
19. 802.11i and WPA Part2 | 01:37 | |
20. 802.11i and WPA Part3 | 02:35 | |
21. RSN (Robust Security Network) | 00:54 | |
22. Future of 802.11 Security Part1 | 01:44 | |
23. Future of 802.11 Security Part2 | 01:30 | |
24. Demo - Networking Basics | 04:45 | |
25. Demo - Web GUI Introduction | 05:13 | |
26. Demo - Security Options | 03:13 | |
27. Module 01 Review | 00:49 |
Video Name | Time | |
---|---|---|
1. Legacy Security | 00:48 | |
2. Authentication | 01:00 | |
3. Open System Authentication | 02:31 | |
4. WEP Encryption | 04:09 | |
5. Shared Key Authentication | 02:26 | |
6. More About WEP Part1 | 06:05 | |
7. More About WEP Part2 | 08:58 | |
8. Attacks Against WEP | 06:19 | |
9. VPNs Part1 | 03:26 | |
10. VPNs Part2 | 06:19 | |
11. VPN Tunneling Protocols | 01:49 | |
12. MAC Filters | 02:36 | |
13. SSID Segmentation | 04:26 | |
14. SSID Cloaking | 01:58 | |
15. Demo - Security Associations | 09:39 | |
16. Demo - Security Associations Part A | 04:39 | |
17. Demo - Security Associations Part B | 05:00 | |
18. Demo - MAC Spoofing | 06:49 | |
19. Module 02 Review | 00:40 |
Video Name | Time | |
---|---|---|
1. Encryption Ciphers and Methods | 00:37 | |
2. Encryption Basics | 08:18 | |
3. Stream and Block Ciphers | 06:00 | |
4. WLAN Encryption Methods | 03:08 | |
5. WEP Again | 01:02 | |
6. TKIP Part1 | 06:54 | |
7. TKIP Part2 | 07:31 | |
8. MIC | 06:59 | |
9. TKIP MPDU | 05:02 | |
10. CCMP Part1 | 03:49 | |
11. CCMP Part2 | 04:07 | |
12. CCMP Part3 | 03:23 | |
13. CCMP Part4 | 02:24 | |
14. CCMP Part5 | 03:45 | |
15. WPA/WPA2 | 01:15 | |
16. Proprietary Solutions | 00:51 | |
17. Demo - Encryption Example | 06:27 | |
18. Module 03 Review | 00:23 |
Video Name | Time | |
---|---|---|
1. 802.11 Authentication Methods | 00:43 | |
2. WLAN Authentication Overview | 08:00 | |
3. AAA | 02:36 | |
4. Authentication | 07:11 | |
5. Authorization | 03:20 | |
6. Accounting | 04:45 | |
7. 802.1X | 05:04 | |
8. Supplicant Credentials | 07:26 | |
9. Authentication Server Credentials | 08:02 | |
10. EAP | 04:23 | |
11. EAP Process | 05:50 | |
12. Legacy EAP | 03:54 | |
13. Strong EAP Protocols | 04:48 | |
14. PACs | 04:46 | |
15. Demo - Certificate Authority Server Credentials | 05:51 | |
16. Module 04 Review | 00:41 |
Video Name | Time | |
---|---|---|
1. Dynamic Encryption Key Generation | 01:07 | |
2. Dynamic WEP | 05:59 | |
3. RSN | 06:44 | |
4. Management Frames & RSNIE (eNotes) | 06:30 | |
5. RSN (Cont.) | 01:11 | |
6. Authentication and Key Management (AKM) Part1 | 04:22 | |
7. Authentication and Key Management (AKM) Part2 | 05:14 | |
8. Authentication and Key Management (AKM) Part3 | 00:43 | |
9. Authentication and Key Management (AKM) Part4 | 02:41 | |
10. RSNA Key Hierarchy | 02:23 | |
11. Master Session Key (MSK) | 02:23 | |
12. 4-Way Handshake | 03:17 | |
13. Steps of the 4 -way Handshake | 00:51 | |
14. Group Key Handshake | 01:07 | |
15. PeerKey Handshake | 02:00 | |
16. Demo - EAP | 05:35 | |
17. Demo - Information Elements | 06:39 | |
18. Module 05 Review | 00:57 |
Video Name | Time | |
---|---|---|
1. SOHO 802.11 Security | 00:25 | |
2. Introduction | 04:48 | |
3. Why a Passphrase | 07:32 | |
4. 4-Way Handshake Again | 05:54 | |
5. Risks of WPA/WPA2 | 04:49 | |
6. Another Risk Factor of WPA/2 | 03:04 | |
7. Wi -Fi Protected Setup (WPS) Part1 | 02:32 | |
8. Wi -Fi Protected Setup (WPS) Part2 | 04:25 | |
9. Wi -Fi Protected Setup (WPS) Part3 | 00:26 | |
10. Wi -Fi Protected Setup (WPS) Part4 | 03:34 | |
11. Wi -Fi Protected Setup (WPS) Part5 | 01:02 | |
12. Initial WLAN Setup | 01:40 | |
13. SOHO Best Practices | 05:56 | |
14. Demo - Cracking Hashes | 09:37 | |
15. Module 06 Review | 00:39 |
Video Name | Time | |
---|---|---|
1. Fast Secure Roaming | 01:07 | |
2. History of 802.11 Roaming | 04:11 | |
3. Client Roaming Thresholds | 03:02 | |
4. AP to AP Handoff (e -notes | 09:10 | |
5. Re -Association | 02:01 | |
6. Types of APs | 03:09 | |
7. RSNA Review | 01:46 | |
8. PMKSA | 07:47 | |
9. PMK Caching | 01:58 | |
10. Pre -authentication | 03:29 | |
11. Opportunistic Key Caching (OKC) | 10:01 | |
12. Proprietary FSR | 06:03 | |
13. FT Key Hierarchy (e -notes) | 09:08 | |
14. FT Initial Mobility Domain Association | 02:17 | |
15. Over the Air Fast BSS Transition (e -notes) | 06:07 | |
16. Over the Air DS Fast BSS Transition (e - notes) | 12:25 | |
17. 802.11K -2008 | 03:51 | |
18. L3 Roaming | 10:43 | |
19. Mobile IP | 04:46 | |
20. Troubleshooting | 03:35 | |
21. Voice Personal and Voice Enterprise | 04:51 |
Video Name | Time | |
---|---|---|
1. Wireless Security Risks | 00:42 | |
2. Introduction | 00:26 | |
3. Rogue Devices Part1 | 09:12 | |
4. Rogue Devices Part2 | 03:43 | |
5. Rogue Prevention | 03:13 | |
6. Eavesdropping | 04:41 | |
7. Authentication Attacks | 01:16 | |
8. DoS | 01:11 | |
9. L2 DoS | 01:11 | |
10. 802.11w | 00:53 | |
11. MAC Spoofing | 01:48 | |
12. Wireless Hijacking | 02:43 | |
13. Peer -to -Peer Attacks | 01:49 | |
14. Management Interface Exploits | 02:42 | |
15. Physical Damage and Theft | 00:40 | |
16. Social Engineering | 00:46 | |
17. Public Access and WLAN Hotspots | 00:38 | |
18. Demo - Rogue Devices | 04:26 | |
19. Demo - Public Hotspots | 06:32 | |
20. Module 08 Review | 00:30 |
Video Name | Time | |
---|---|---|
1. Wireless LAN Security Auditing | 00:19 | |
2. Purpose of Auditing | 01:27 | |
3. WLAN Audits Part1 | 01:52 | |
4. WLAN Audits Part2 | 00:46 | |
5. Layer 1 Audit | 05:13 | |
6. Layer 2 Audit | 02:13 | |
7. Penetration Testing | 03:57 | |
8. Wired Infrastructure Audit | 03:07 | |
9. Social Engineering | 01:47 | |
10. WIPS Audit | 00:52 | |
11. Documenting the Audit | 04:10 | |
12. Recommendations | 00:43 | |
13. WLAN Security Auditing Tools | 01:32 | |
14. Module 09 Review | 00:23 |
Video Name | Time | |
---|---|---|
1. Wireless Security Monitoring | 00:45 | |
2. WIDS/WIPS | 01:02 | |
3. WIDS/WIPS continue | 06:23 | |
4. Sensor Placement | 03:57 | |
5. Example of Rogue Detection (e -notes) | 08:57 | |
6. Device Tracking | 06:53 | |
7. Signature Analysis | 01:04 | |
8. Behavioral Analysis | 02:22 | |
9. Other Types of Monitoring | 05:57 | |
10. More on Monitoring | 00:52 | |
11. Module 10 Review | 00:24 |
Video Name | Time | |
---|---|---|
1. VPNs, Remote Access and Guest Access Services | 00:34 | |
2. VPN Review Part1 | 11:18 | |
3. VPN Review Part2 | 11:00 | |
4. Remote Access Part1 | 06:20 | |
5. Remote Access Part2 | 07:22 | |
6. Module 11 Review | 00:22 |
Video Name | Time | |
---|---|---|
1. WLAN Security Infrastructure | 00:39 | |
2. WLAN Architecture | 07:35 | |
3. Lightweight or Controller Based APs (e-notes) | 08:16 | |
4. Other Controller Based Definitions | 14:08 | |
5. Device Management | 06:58 | |
6. Management Protocols | 06:49 | |
7. Controller Communications | 05:26 | |
8. Authorization Servers | 03:13 | |
9. Deployment Architectures | 07:40 | |
10. Other RADIUS Solutions | 04:48 | |
11. RBAC | 04:18 | |
12. Other Security Systems | 06:18 | |
13. Module 12 Review | 00:23 |
Video Name | Time | |
---|---|---|
1. Wireless Security Policies | 00:21 | |
2. General Policy Part1 | 02:13 | |
3. General Policy Part2 | 04:15 | |
4. Policy Creation | 03:13 | |
5. Policy Management | 02:26 | |
6. Functional Policy | 02:52 | |
7. Password Policy | 01:40 | |
8. Other Policies Part1 | 03:33 | |
9. Other Policies Part2 | 02:18 | |
10. Government and Industry Regulations | 06:20 | |
11. Module 13 Review | 00:25 | |
12. Course Closure | 01:47 |
Student Feedback
Similar Courses
Only Registered Members can View Training Courses
Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.
Try Free Demo
Try Free Demo
Get 10% Discount on Your Purchase When You Sign Up for Email
Enter Your Email Address to Receive Your 10%
OFF Discount Code Plus... Our Exclusive Weekly Deals