CWSP-206: CWSP Certified Wireless Security Professional
Prepare for your CWNP examination with our training course. The CWSP-206 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to CWNP certification exam. Pass the CWNP CWSP-206 test with flying colors.
Curriculum For This Course
-
1. Introduction1m 35s
-
2. Instructor Introduction1m 42s
-
1. WLAN Security Overview1m 40s
-
2. Where We Came From2m 26s
-
3. Standards Organizations1m 31s
-
4. ISO and the OSI10m 25s
-
5. ISOC Hierarchy3m
-
6. Wi-Fi Alliance Standards7m 2s
-
7. 802.11 Networking Basics Part11m 28s
-
8. 802.11 Networking Basics Part22m 43s
-
9. Connection Types2m 8s
-
10. 802.11 Security Basics1m 54s
-
11. Data Privacy Part11m 48s
-
12. Data Privacy Part23m 14s
-
13. AAA1m 33s
-
14. Segmentation3m 46s
-
15. Monitoring1m 42s
-
16. Policy1m 19s
-
17. Security History51s
-
18. 802.11i and WPA Part145s
-
19. 802.11i and WPA Part21m 37s
-
20. 802.11i and WPA Part32m 35s
-
21. RSN (Robust Security Network)54s
-
22. Future of 802.11 Security Part11m 44s
-
23. Future of 802.11 Security Part21m 30s
-
24. Demo - Networking Basics4m 45s
-
25. Demo - Web GUI Introduction5m 13s
-
26. Demo - Security Options3m 13s
-
27. Module 01 Review49s
-
1. Legacy Security48s
-
2. Authentication1m
-
3. Open System Authentication2m 31s
-
4. WEP Encryption4m 9s
-
5. Shared Key Authentication2m 26s
-
6. More About WEP Part16m 5s
-
7. More About WEP Part28m 58s
-
8. Attacks Against WEP6m 19s
-
9. VPNs Part13m 26s
-
10. VPNs Part26m 19s
-
11. VPN Tunneling Protocols1m 49s
-
12. MAC Filters2m 36s
-
13. SSID Segmentation4m 26s
-
14. SSID Cloaking1m 58s
-
15. Demo - Security Associations9m 39s
-
16. Demo - Security Associations Part A4m 39s
-
17. Demo - Security Associations Part B5m
-
18. Demo - MAC Spoofing6m 49s
-
19. Module 02 Review40s
-
1. Encryption Ciphers and Methods37s
-
2. Encryption Basics8m 18s
-
3. Stream and Block Ciphers6m
-
4. WLAN Encryption Methods3m 8s
-
5. WEP Again1m 2s
-
6. TKIP Part16m 54s
-
7. TKIP Part27m 31s
-
8. MIC6m 59s
-
9. TKIP MPDU5m 2s
-
10. CCMP Part13m 49s
-
11. CCMP Part24m 7s
-
12. CCMP Part33m 23s
-
13. CCMP Part42m 24s
-
14. CCMP Part53m 45s
-
15. WPA/WPA21m 15s
-
16. Proprietary Solutions51s
-
17. Demo - Encryption Example6m 27s
-
18. Module 03 Review23s
-
1. 802.11 Authentication Methods43s
-
2. WLAN Authentication Overview8m
-
3. AAA2m 36s
-
4. Authentication7m 11s
-
5. Authorization3m 20s
-
6. Accounting4m 45s
-
7. 802.1X5m 4s
-
8. Supplicant Credentials7m 26s
-
9. Authentication Server Credentials8m 2s
-
10. EAP4m 23s
-
11. EAP Process5m 50s
-
12. Legacy EAP3m 54s
-
13. Strong EAP Protocols4m 48s
-
14. PACs4m 46s
-
15. Demo - Certificate Authority Server Credentials5m 51s
-
16. Module 04 Review41s
-
1. Dynamic Encryption Key Generation1m 7s
-
2. Dynamic WEP5m 59s
-
3. RSN6m 44s
-
4. Management Frames & RSNIE (eNotes)6m 30s
-
5. RSN (Cont.)1m 11s
-
6. Authentication and Key Management (AKM) Part14m 22s
-
7. Authentication and Key Management (AKM) Part25m 14s
-
8. Authentication and Key Management (AKM) Part343s
-
9. Authentication and Key Management (AKM) Part42m 41s
-
10. RSNA Key Hierarchy2m 23s
-
11. Master Session Key (MSK)2m 23s
-
12. 4-Way Handshake3m 17s
-
13. Steps of the 4 -way Handshake51s
-
14. Group Key Handshake1m 7s
-
15. PeerKey Handshake2m
-
16. Demo - EAP5m 35s
-
17. Demo - Information Elements6m 39s
-
18. Module 05 Review57s
-
1. SOHO 802.11 Security25s
-
2. Introduction4m 48s
-
3. Why a Passphrase7m 32s
-
4. 4-Way Handshake Again5m 54s
-
5. Risks of WPA/WPA24m 49s
-
6. Another Risk Factor of WPA/23m 4s
-
7. Wi -Fi Protected Setup (WPS) Part12m 32s
-
8. Wi -Fi Protected Setup (WPS) Part24m 25s
-
9. Wi -Fi Protected Setup (WPS) Part326s
-
10. Wi -Fi Protected Setup (WPS) Part43m 34s
-
11. Wi -Fi Protected Setup (WPS) Part51m 2s
-
12. Initial WLAN Setup1m 40s
-
13. SOHO Best Practices5m 56s
-
14. Demo - Cracking Hashes9m 37s
-
15. Module 06 Review39s
-
1. Fast Secure Roaming1m 7s
-
2. History of 802.11 Roaming4m 11s
-
3. Client Roaming Thresholds3m 2s
-
4. AP to AP Handoff (e -notes9m 10s
-
5. Re -Association2m 1s
-
6. Types of APs3m 9s
-
7. RSNA Review1m 46s
-
8. PMKSA7m 47s
-
9. PMK Caching1m 58s
-
10. Pre -authentication3m 29s
-
11. Opportunistic Key Caching (OKC)10m 1s
-
12. Proprietary FSR6m 3s
-
13. FT Key Hierarchy (e -notes)9m 8s
-
14. FT Initial Mobility Domain Association2m 17s
-
15. Over the Air Fast BSS Transition (e -notes)6m 7s
-
16. Over the Air DS Fast BSS Transition (e - notes)12m 25s
-
17. 802.11K -20083m 51s
-
18. L3 Roaming10m 43s
-
19. Mobile IP4m 46s
-
20. Troubleshooting3m 35s
-
21. Voice Personal and Voice Enterprise4m 51s
-
1. Wireless Security Risks42s
-
2. Introduction26s
-
3. Rogue Devices Part19m 12s
-
4. Rogue Devices Part23m 43s
-
5. Rogue Prevention3m 13s
-
6. Eavesdropping4m 41s
-
7. Authentication Attacks1m 16s
-
8. DoS1m 11s
-
9. L2 DoS1m 11s
-
10. 802.11w53s
-
11. MAC Spoofing1m 48s
-
12. Wireless Hijacking2m 43s
-
13. Peer -to -Peer Attacks1m 49s
-
14. Management Interface Exploits2m 42s
-
15. Physical Damage and Theft40s
-
16. Social Engineering46s
-
17. Public Access and WLAN Hotspots38s
-
18. Demo - Rogue Devices4m 26s
-
19. Demo - Public Hotspots6m 32s
-
20. Module 08 Review30s
-
1. Wireless LAN Security Auditing19s
-
2. Purpose of Auditing1m 27s
-
3. WLAN Audits Part11m 52s
-
4. WLAN Audits Part246s
-
5. Layer 1 Audit5m 13s
-
6. Layer 2 Audit2m 13s
-
7. Penetration Testing3m 57s
-
8. Wired Infrastructure Audit3m 7s
-
9. Social Engineering1m 47s
-
10. WIPS Audit52s
-
11. Documenting the Audit4m 10s
-
12. Recommendations43s
-
13. WLAN Security Auditing Tools1m 32s
-
14. Module 09 Review23s
-
1. Wireless Security Monitoring45s
-
2. WIDS/WIPS1m 2s
-
3. WIDS/WIPS continue6m 23s
-
4. Sensor Placement3m 57s
-
5. Example of Rogue Detection (e -notes)8m 57s
-
6. Device Tracking6m 53s
-
7. Signature Analysis1m 4s
-
8. Behavioral Analysis2m 22s
-
9. Other Types of Monitoring5m 57s
-
10. More on Monitoring52s
-
11. Module 10 Review24s
-
1. VPNs, Remote Access and Guest Access Services34s
-
2. VPN Review Part111m 18s
-
3. VPN Review Part211m
-
4. Remote Access Part16m 20s
-
5. Remote Access Part27m 22s
-
6. Module 11 Review22s
-
1. WLAN Security Infrastructure39s
-
2. WLAN Architecture7m 35s
-
3. Lightweight or Controller Based APs (e-notes)8m 16s
-
4. Other Controller Based Definitions14m 8s
-
5. Device Management6m 58s
-
6. Management Protocols6m 49s
-
7. Controller Communications5m 26s
-
8. Authorization Servers3m 13s
-
9. Deployment Architectures7m 40s
-
10. Other RADIUS Solutions4m 48s
-
11. RBAC4m 18s
-
12. Other Security Systems6m 18s
-
13. Module 12 Review23s
-
1. Wireless Security Policies21s
-
2. General Policy Part12m 13s
-
3. General Policy Part24m 15s
-
4. Policy Creation3m 13s
-
5. Policy Management2m 26s
-
6. Functional Policy2m 52s
-
7. Password Policy1m 40s
-
8. Other Policies Part13m 33s
-
9. Other Policies Part22m 18s
-
10. Government and Industry Regulations6m 20s
-
11. Module 13 Review25s
-
12. Course Closure1m 47s
Hot Exams
Free Test Engine Player
How to open .dumpsarena Files
Use FREE DumpsArena Test Engine player to open .dumpsarena files
Our test engine player will always be free.
Satisfaction Guaranteed
98.4% DumpsArena users pass
Our team is dedicated to delivering top-quality exam practice questions. We proudly offer a hassle-free satisfaction guarantee.
Why choose DumpsArena?
23,812+
Satisfied Customers Since 2018
- Always Up-to-Date
- Accurate and Verified
- Free Regular Updates
- 24/7 Customer Support
- Instant Access to Downloads
Secure Experience
Guaranteed safe checkout.
At DumpsArena, your shopping security is our priority. We utilize high-security SSL encryption, ensuring that every purchase is 100% secure.