CWSP Certified Wireless Security Professional Video Course

CWSP-206: CWSP Certified Wireless Security Professional

Your CWNP CWSP-206 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the CWSP-206 certification test. Ace your CWNP CWSP-206 at the first attempt and obtain the CWSP Certified Wireless Security Professional credential with ease.

# of Students
133
# of Lectures
212
Course Length
13 h
Course Rating
4.5
Price $32.99
Today $29.99

Curriculum for CWSP-206 Video Course

Course Introduction

  Video Name Time
  1. Introduction 01:35
  2. Instructor Introduction 01:42
  Video Name Time
  1. WLAN Security Overview 01:40
  2. Where We Came From 02:26
  3. Standards Organizations 01:31
  4. ISO and the OSI 10:25
  5. ISOC Hierarchy 03:00
  6. Wi-Fi Alliance Standards 07:02
  7. 802.11 Networking Basics Part1 01:28
  8. 802.11 Networking Basics Part2 02:43
  9. Connection Types 02:08
  10. 802.11 Security Basics 01:54
  11. Data Privacy Part1 01:48
  12. Data Privacy Part2 03:14
  13. AAA 01:33
  14. Segmentation 03:46
  15. Monitoring 01:42
  16. Policy 01:19
  17. Security History 00:51
  18. 802.11i and WPA Part1 00:45
  19. 802.11i and WPA Part2 01:37
  20. 802.11i and WPA Part3 02:35
  21. RSN (Robust Security Network) 00:54
  22. Future of 802.11 Security Part1 01:44
  23. Future of 802.11 Security Part2 01:30
  24. Demo - Networking Basics 04:45
  25. Demo - Web GUI Introduction 05:13
  26. Demo - Security Options 03:13
  27. Module 01 Review 00:49
  Video Name Time
  1. Legacy Security 00:48
  2. Authentication 01:00
  3. Open System Authentication 02:31
  4. WEP Encryption 04:09
  5. Shared Key Authentication 02:26
  6. More About WEP Part1 06:05
  7. More About WEP Part2 08:58
  8. Attacks Against WEP 06:19
  9. VPNs Part1 03:26
  10. VPNs Part2 06:19
  11. VPN Tunneling Protocols 01:49
  12. MAC Filters 02:36
  13. SSID Segmentation 04:26
  14. SSID Cloaking 01:58
  15. Demo - Security Associations 09:39
  16. Demo - Security Associations Part A 04:39
  17. Demo - Security Associations Part B 05:00
  18. Demo - MAC Spoofing 06:49
  19. Module 02 Review 00:40
  Video Name Time
  1. Encryption Ciphers and Methods 00:37
  2. Encryption Basics 08:18
  3. Stream and Block Ciphers 06:00
  4. WLAN Encryption Methods 03:08
  5. WEP Again 01:02
  6. TKIP Part1 06:54
  7. TKIP Part2 07:31
  8. MIC 06:59
  9. TKIP MPDU 05:02
  10. CCMP Part1 03:49
  11. CCMP Part2 04:07
  12. CCMP Part3 03:23
  13. CCMP Part4 02:24
  14. CCMP Part5 03:45
  15. WPA/WPA2 01:15
  16. Proprietary Solutions 00:51
  17. Demo - Encryption Example 06:27
  18. Module 03 Review 00:23
  Video Name Time
  1. 802.11 Authentication Methods 00:43
  2. WLAN Authentication Overview 08:00
  3. AAA 02:36
  4. Authentication 07:11
  5. Authorization 03:20
  6. Accounting 04:45
  7. 802.1X 05:04
  8. Supplicant Credentials 07:26
  9. Authentication Server Credentials 08:02
  10. EAP 04:23
  11. EAP Process 05:50
  12. Legacy EAP 03:54
  13. Strong EAP Protocols 04:48
  14. PACs 04:46
  15. Demo - Certificate Authority Server Credentials 05:51
  16. Module 04 Review 00:41
  Video Name Time
  1. Dynamic Encryption Key Generation 01:07
  2. Dynamic WEP 05:59
  3. RSN 06:44
  4. Management Frames & RSNIE (eNotes) 06:30
  5. RSN (Cont.) 01:11
  6. Authentication and Key Management (AKM) Part1 04:22
  7. Authentication and Key Management (AKM) Part2 05:14
  8. Authentication and Key Management (AKM) Part3 00:43
  9. Authentication and Key Management (AKM) Part4 02:41
  10. RSNA Key Hierarchy 02:23
  11. Master Session Key (MSK) 02:23
  12. 4-Way Handshake 03:17
  13. Steps of the 4 -way Handshake 00:51
  14. Group Key Handshake 01:07
  15. PeerKey Handshake 02:00
  16. Demo - EAP 05:35
  17. Demo - Information Elements 06:39
  18. Module 05 Review 00:57
  Video Name Time
  1. SOHO 802.11 Security 00:25
  2. Introduction 04:48
  3. Why a Passphrase 07:32
  4. 4-Way Handshake Again 05:54
  5. Risks of WPA/WPA2 04:49
  6. Another Risk Factor of WPA/2 03:04
  7. Wi -Fi Protected Setup (WPS) Part1 02:32
  8. Wi -Fi Protected Setup (WPS) Part2 04:25
  9. Wi -Fi Protected Setup (WPS) Part3 00:26
  10. Wi -Fi Protected Setup (WPS) Part4 03:34
  11. Wi -Fi Protected Setup (WPS) Part5 01:02
  12. Initial WLAN Setup 01:40
  13. SOHO Best Practices 05:56
  14. Demo - Cracking Hashes 09:37
  15. Module 06 Review 00:39
  Video Name Time
  1. Fast Secure Roaming 01:07
  2. History of 802.11 Roaming 04:11
  3. Client Roaming Thresholds 03:02
  4. AP to AP Handoff (e -notes 09:10
  5. Re -Association 02:01
  6. Types of APs 03:09
  7. RSNA Review 01:46
  8. PMKSA 07:47
  9. PMK Caching 01:58
  10. Pre -authentication 03:29
  11. Opportunistic Key Caching (OKC) 10:01
  12. Proprietary FSR 06:03
  13. FT Key Hierarchy (e -notes) 09:08
  14. FT Initial Mobility Domain Association 02:17
  15. Over the Air Fast BSS Transition (e -notes) 06:07
  16. Over the Air DS Fast BSS Transition (e - notes) 12:25
  17. 802.11K -2008 03:51
  18. L3 Roaming 10:43
  19. Mobile IP 04:46
  20. Troubleshooting 03:35
  21. Voice Personal and Voice Enterprise 04:51
  Video Name Time
  1. Wireless Security Risks 00:42
  2. Introduction 00:26
  3. Rogue Devices Part1 09:12
  4. Rogue Devices Part2 03:43
  5. Rogue Prevention 03:13
  6. Eavesdropping 04:41
  7. Authentication Attacks 01:16
  8. DoS 01:11
  9. L2 DoS 01:11
  10. 802.11w 00:53
  11. MAC Spoofing 01:48
  12. Wireless Hijacking 02:43
  13. Peer -to -Peer Attacks 01:49
  14. Management Interface Exploits 02:42
  15. Physical Damage and Theft 00:40
  16. Social Engineering 00:46
  17. Public Access and WLAN Hotspots 00:38
  18. Demo - Rogue Devices 04:26
  19. Demo - Public Hotspots 06:32
  20. Module 08 Review 00:30
  Video Name Time
  1. Wireless LAN Security Auditing 00:19
  2. Purpose of Auditing 01:27
  3. WLAN Audits Part1 01:52
  4. WLAN Audits Part2 00:46
  5. Layer 1 Audit 05:13
  6. Layer 2 Audit 02:13
  7. Penetration Testing 03:57
  8. Wired Infrastructure Audit 03:07
  9. Social Engineering 01:47
  10. WIPS Audit 00:52
  11. Documenting the Audit 04:10
  12. Recommendations 00:43
  13. WLAN Security Auditing Tools 01:32
  14. Module 09 Review 00:23
  Video Name Time
  1. Wireless Security Monitoring 00:45
  2. WIDS/WIPS 01:02
  3. WIDS/WIPS continue 06:23
  4. Sensor Placement 03:57
  5. Example of Rogue Detection (e -notes) 08:57
  6. Device Tracking 06:53
  7. Signature Analysis 01:04
  8. Behavioral Analysis 02:22
  9. Other Types of Monitoring 05:57
  10. More on Monitoring 00:52
  11. Module 10 Review 00:24
  Video Name Time
  1. VPNs, Remote Access and Guest Access Services 00:34
  2. VPN Review Part1 11:18
  3. VPN Review Part2 11:00
  4. Remote Access Part1 06:20
  5. Remote Access Part2 07:22
  6. Module 11 Review 00:22
  Video Name Time
  1. WLAN Security Infrastructure 00:39
  2. WLAN Architecture 07:35
  3. Lightweight or Controller Based APs (e-notes) 08:16
  4. Other Controller Based Definitions 14:08
  5. Device Management 06:58
  6. Management Protocols 06:49
  7. Controller Communications 05:26
  8. Authorization Servers 03:13
  9. Deployment Architectures 07:40
  10. Other RADIUS Solutions 04:48
  11. RBAC 04:18
  12. Other Security Systems 06:18
  13. Module 12 Review 00:23
  Video Name Time
  1. Wireless Security Policies 00:21
  2. General Policy Part1 02:13
  3. General Policy Part2 04:15
  4. Policy Creation 03:13
  5. Policy Management 02:26
  6. Functional Policy 02:52
  7. Password Policy 01:40
  8. Other Policies Part1 03:33
  9. Other Policies Part2 02:18
  10. Government and Industry Regulations 06:20
  11. Module 13 Review 00:25
  12. Course Closure 01:47

Student Feedback

5 Stars
4 Stars
3 Stars
2 Stars
1 Star
4.5
Rating: 4.5
Overall Rating: Good.

Similar Courses

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

1200+ IT Certification Exams available: Get a free sample of any exam right now!
Try Free Demo

Try Free Demo

  • ABA
  • ACAMS
  • ACFE
  • ACI
  • ACSM
  • Adobe
  • AHIMA
  • AHIP
  • AHLEI
  • AICPA
  • AIWMI
  • Alfresco
  • AMA
  • Amazon
  • AndroidATC
  • APBM
  • API
  • APICS
  • Apple
  • Arista
  • Aruba
  • ASIS
  • ASQ
  • Atlassian
  • Autodesk
  • Avaya
  • Axis Communications
  • BACB
  • BCS
  • BICSI
  • Blockchain
  • Blue Coat
  • Blue Prism
  • Brocade
  • C++ Institute
  • CA Technologies
  • Checkpoint
  • CIMA
  • Cisco
  • Citrix
  • CIW
  • Cloudera
  • CompTIA
  • CSA
  • CWNP
  • CyberArc
  • Dell
  • DMI
  • DSCI
  • ECCouncil
  • EMC
  • Esri
  • Exin
  • Extreme Networks
  • F5
  • FileMaker
  • FINRA
  • Fortinet
  • GAQM
  • GARP
  • Genesys
  • GIAC
  • Google
  • Guidance Software
  • H3C
  • HFMA
  • HIPAA
  • Hitachi
  • HP
  • HRCI
  • Huawei
  • IAPP
  • IBM
  • IFPUG
  • IIA
  • IIBA
  • Informatica
  • Isaca
  • iSAQB
  • ISC
  • iSQI
  • ISTQB
  • ITIL
  • Juniper
  • Linux Foundation
  • Logical Operations
  • LPI
  • Magento
  • Marketo
  • McAfee
  • Microsoft
  • Mulesoft
  • NACVA
  • NCMA
  • Network Appliance
  • NI
  • Nokia
  • Novell
  • Nuage Networks
  • OMG
  • Palo Alto Networks
  • Pegasystems
  • PEOPLECERT
  • PMI
  • PRINCE2
  • Python Institute
  • QlikView
  • RedHat
  • Riverbed
  • RSA
  • Salesforce
  • SANS
  • SAP
  • SAS Institute
  • Scrum
  • SDI
  • ServiceNow
  • Six Sigma
  • SNIA
  • SOA
  • Software Certifications
  • SolarWinds
  • Splunk
  • SpringSource
  • Symantec
  • Teradata
  • Test Prep
  • The Open Group
  • Tibco
  • VCE
  • Veeam
  • Veritas
  • Vmedu
  • VMware
  • WatchGuard
  • WorldatWork
  • Zend
Next Step
Next Step

Try Free Demo

  • CWNP
Next Step
Next Step

Summer Sale! Get 25% Discount on All Your Purchases!

Passguide Products

Enter Your Email Address to Receive Your 25%
OFF
Discount Code Plus... Our Exclusive Weekly Deals

* We value your privacy. We will not rent or sell your email address