CWSP-206: CWSP Certified Wireless Security Professional

CWSP-206: CWSP Certified Wireless Security Professional

BEST SELLER 212 Lectures 13h 12m 6s

Prepare for your CWNP examination with our training course. The CWSP-206 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to CWNP certification exam. Pass the CWNP CWSP-206 test with flying colors.

$24.99 $32.49

Curriculum For This Course

2 lectures 3m 17s
  • 1. Introduction
    1m 35s
  • 2. Instructor Introduction
    1m 42s

27 lectures 1h 11m 35s
  • 1. WLAN Security Overview
    1m 40s
  • 2. Where We Came From
    2m 26s
  • 3. Standards Organizations
    1m 31s
  • 4. ISO and the OSI
    10m 25s
  • 5. ISOC Hierarchy
    3m
  • 6. Wi-Fi Alliance Standards
    7m 2s
  • 7. 802.11 Networking Basics Part1
    1m 28s
  • 8. 802.11 Networking Basics Part2
    2m 43s
  • 9. Connection Types
    2m 8s
  • 10. 802.11 Security Basics
    1m 54s
  • 11. Data Privacy Part1
    1m 48s
  • 12. Data Privacy Part2
    3m 14s
  • 13. AAA
    1m 33s
  • 14. Segmentation
    3m 46s
  • 15. Monitoring
    1m 42s
  • 16. Policy
    1m 19s
  • 17. Security History
    51s
  • 18. 802.11i and WPA Part1
    45s
  • 19. 802.11i and WPA Part2
    1m 37s
  • 20. 802.11i and WPA Part3
    2m 35s
  • 21. RSN (Robust Security Network)
    54s
  • 22. Future of 802.11 Security Part1
    1m 44s
  • 23. Future of 802.11 Security Part2
    1m 30s
  • 24. Demo - Networking Basics
    4m 45s
  • 25. Demo - Web GUI Introduction
    5m 13s
  • 26. Demo - Security Options
    3m 13s
  • 27. Module 01 Review
    49s

19 lectures 1h 19m 37s
  • 1. Legacy Security
    48s
  • 2. Authentication
    1m
  • 3. Open System Authentication
    2m 31s
  • 4. WEP Encryption
    4m 9s
  • 5. Shared Key Authentication
    2m 26s
  • 6. More About WEP Part1
    6m 5s
  • 7. More About WEP Part2
    8m 58s
  • 8. Attacks Against WEP
    6m 19s
  • 9. VPNs Part1
    3m 26s
  • 10. VPNs Part2
    6m 19s
  • 11. VPN Tunneling Protocols
    1m 49s
  • 12. MAC Filters
    2m 36s
  • 13. SSID Segmentation
    4m 26s
  • 14. SSID Cloaking
    1m 58s
  • 15. Demo - Security Associations
    9m 39s
  • 16. Demo - Security Associations Part A
    4m 39s
  • 17. Demo - Security Associations Part B
    5m
  • 18. Demo - MAC Spoofing
    6m 49s
  • 19. Module 02 Review
    40s

18 lectures 1h 11m 55s
  • 1. Encryption Ciphers and Methods
    37s
  • 2. Encryption Basics
    8m 18s
  • 3. Stream and Block Ciphers
    6m
  • 4. WLAN Encryption Methods
    3m 8s
  • 5. WEP Again
    1m 2s
  • 6. TKIP Part1
    6m 54s
  • 7. TKIP Part2
    7m 31s
  • 8. MIC
    6m 59s
  • 9. TKIP MPDU
    5m 2s
  • 10. CCMP Part1
    3m 49s
  • 11. CCMP Part2
    4m 7s
  • 12. CCMP Part3
    3m 23s
  • 13. CCMP Part4
    2m 24s
  • 14. CCMP Part5
    3m 45s
  • 15. WPA/WPA2
    1m 15s
  • 16. Proprietary Solutions
    51s
  • 17. Demo - Encryption Example
    6m 27s
  • 18. Module 03 Review
    23s

16 lectures 1h 17m 20s
  • 1. 802.11 Authentication Methods
    43s
  • 2. WLAN Authentication Overview
    8m
  • 3. AAA
    2m 36s
  • 4. Authentication
    7m 11s
  • 5. Authorization
    3m 20s
  • 6. Accounting
    4m 45s
  • 7. 802.1X
    5m 4s
  • 8. Supplicant Credentials
    7m 26s
  • 9. Authentication Server Credentials
    8m 2s
  • 10. EAP
    4m 23s
  • 11. EAP Process
    5m 50s
  • 12. Legacy EAP
    3m 54s
  • 13. Strong EAP Protocols
    4m 48s
  • 14. PACs
    4m 46s
  • 15. Demo - Certificate Authority Server Credentials
    5m 51s
  • 16. Module 04 Review
    41s

18 lectures 59m 43s
  • 1. Dynamic Encryption Key Generation
    1m 7s
  • 2. Dynamic WEP
    5m 59s
  • 3. RSN
    6m 44s
  • 4. Management Frames & RSNIE (eNotes)
    6m 30s
  • 5. RSN (Cont.)
    1m 11s
  • 6. Authentication and Key Management (AKM) Part1
    4m 22s
  • 7. Authentication and Key Management (AKM) Part2
    5m 14s
  • 8. Authentication and Key Management (AKM) Part3
    43s
  • 9. Authentication and Key Management (AKM) Part4
    2m 41s
  • 10. RSNA Key Hierarchy
    2m 23s
  • 11. Master Session Key (MSK)
    2m 23s
  • 12. 4-Way Handshake
    3m 17s
  • 13. Steps of the 4 -way Handshake
    51s
  • 14. Group Key Handshake
    1m 7s
  • 15. PeerKey Handshake
    2m
  • 16. Demo - EAP
    5m 35s
  • 17. Demo - Information Elements
    6m 39s
  • 18. Module 05 Review
    57s

15 lectures 56m 23s
  • 1. SOHO 802.11 Security
    25s
  • 2. Introduction
    4m 48s
  • 3. Why a Passphrase
    7m 32s
  • 4. 4-Way Handshake Again
    5m 54s
  • 5. Risks of WPA/WPA2
    4m 49s
  • 6. Another Risk Factor of WPA/2
    3m 4s
  • 7. Wi -Fi Protected Setup (WPS) Part1
    2m 32s
  • 8. Wi -Fi Protected Setup (WPS) Part2
    4m 25s
  • 9. Wi -Fi Protected Setup (WPS) Part3
    26s
  • 10. Wi -Fi Protected Setup (WPS) Part4
    3m 34s
  • 11. Wi -Fi Protected Setup (WPS) Part5
    1m 2s
  • 12. Initial WLAN Setup
    1m 40s
  • 13. SOHO Best Practices
    5m 56s
  • 14. Demo - Cracking Hashes
    9m 37s
  • 15. Module 06 Review
    39s

21 lectures 1h 51m 27s
  • 1. Fast Secure Roaming
    1m 7s
  • 2. History of 802.11 Roaming
    4m 11s
  • 3. Client Roaming Thresholds
    3m 2s
  • 4. AP to AP Handoff (e -notes
    9m 10s
  • 5. Re -Association
    2m 1s
  • 6. Types of APs
    3m 9s
  • 7. RSNA Review
    1m 46s
  • 8. PMKSA
    7m 47s
  • 9. PMK Caching
    1m 58s
  • 10. Pre -authentication
    3m 29s
  • 11. Opportunistic Key Caching (OKC)
    10m 1s
  • 12. Proprietary FSR
    6m 3s
  • 13. FT Key Hierarchy (e -notes)
    9m 8s
  • 14. FT Initial Mobility Domain Association
    2m 17s
  • 15. Over the Air Fast BSS Transition (e -notes)
    6m 7s
  • 16. Over the Air DS Fast BSS Transition (e - notes)
    12m 25s
  • 17. 802.11K -2008
    3m 51s
  • 18. L3 Roaming
    10m 43s
  • 19. Mobile IP
    4m 46s
  • 20. Troubleshooting
    3m 35s
  • 21. Voice Personal and Voice Enterprise
    4m 51s

20 lectures 49m 2s
  • 1. Wireless Security Risks
    42s
  • 2. Introduction
    26s
  • 3. Rogue Devices Part1
    9m 12s
  • 4. Rogue Devices Part2
    3m 43s
  • 5. Rogue Prevention
    3m 13s
  • 6. Eavesdropping
    4m 41s
  • 7. Authentication Attacks
    1m 16s
  • 8. DoS
    1m 11s
  • 9. L2 DoS
    1m 11s
  • 10. 802.11w
    53s
  • 11. MAC Spoofing
    1m 48s
  • 12. Wireless Hijacking
    2m 43s
  • 13. Peer -to -Peer Attacks
    1m 49s
  • 14. Management Interface Exploits
    2m 42s
  • 15. Physical Damage and Theft
    40s
  • 16. Social Engineering
    46s
  • 17. Public Access and WLAN Hotspots
    38s
  • 18. Demo - Rogue Devices
    4m 26s
  • 19. Demo - Public Hotspots
    6m 32s
  • 20. Module 08 Review
    30s

14 lectures 28m 21s
  • 1. Wireless LAN Security Auditing
    19s
  • 2. Purpose of Auditing
    1m 27s
  • 3. WLAN Audits Part1
    1m 52s
  • 4. WLAN Audits Part2
    46s
  • 5. Layer 1 Audit
    5m 13s
  • 6. Layer 2 Audit
    2m 13s
  • 7. Penetration Testing
    3m 57s
  • 8. Wired Infrastructure Audit
    3m 7s
  • 9. Social Engineering
    1m 47s
  • 10. WIPS Audit
    52s
  • 11. Documenting the Audit
    4m 10s
  • 12. Recommendations
    43s
  • 13. WLAN Security Auditing Tools
    1m 32s
  • 14. Module 09 Review
    23s

11 lectures 38m 36s
  • 1. Wireless Security Monitoring
    45s
  • 2. WIDS/WIPS
    1m 2s
  • 3. WIDS/WIPS continue
    6m 23s
  • 4. Sensor Placement
    3m 57s
  • 5. Example of Rogue Detection (e -notes)
    8m 57s
  • 6. Device Tracking
    6m 53s
  • 7. Signature Analysis
    1m 4s
  • 8. Behavioral Analysis
    2m 22s
  • 9. Other Types of Monitoring
    5m 57s
  • 10. More on Monitoring
    52s
  • 11. Module 10 Review
    24s

6 lectures 36m 56s
  • 1. VPNs, Remote Access and Guest Access Services
    34s
  • 2. VPN Review Part1
    11m 18s
  • 3. VPN Review Part2
    11m
  • 4. Remote Access Part1
    6m 20s
  • 5. Remote Access Part2
    7m 22s
  • 6. Module 11 Review
    22s

13 lectures 1h 16m 31s
  • 1. WLAN Security Infrastructure
    39s
  • 2. WLAN Architecture
    7m 35s
  • 3. Lightweight or Controller Based APs (e-notes)
    8m 16s
  • 4. Other Controller Based Definitions
    14m 8s
  • 5. Device Management
    6m 58s
  • 6. Management Protocols
    6m 49s
  • 7. Controller Communications
    5m 26s
  • 8. Authorization Servers
    3m 13s
  • 9. Deployment Architectures
    7m 40s
  • 10. Other RADIUS Solutions
    4m 48s
  • 11. RBAC
    4m 18s
  • 12. Other Security Systems
    6m 18s
  • 13. Module 12 Review
    23s

12 lectures 31m 23s
  • 1. Wireless Security Policies
    21s
  • 2. General Policy Part1
    2m 13s
  • 3. General Policy Part2
    4m 15s
  • 4. Policy Creation
    3m 13s
  • 5. Policy Management
    2m 26s
  • 6. Functional Policy
    2m 52s
  • 7. Password Policy
    1m 40s
  • 8. Other Policies Part1
    3m 33s
  • 9. Other Policies Part2
    2m 18s
  • 10. Government and Industry Regulations
    6m 20s
  • 11. Module 13 Review
    25s
  • 12. Course Closure
    1m 47s

Free Test Engine Player

How to open .dumpsarena Files

Use FREE DumpsArena Test Engine player to open .dumpsarena files

Our test engine player will always be free.

DumpsArena Test Engine

Windows
Satisfaction Guaranteed

98.4% DumpsArena users pass

Our team is dedicated to delivering top-quality exam practice questions. We proudly offer a hassle-free satisfaction guarantee.

Why choose DumpsArena?

23,812+

Satisfied Customers Since 2018

  • Always Up-to-Date
  • Accurate and Verified
  • Free Regular Updates
  • 24/7 Customer Support
  • Instant Access to Downloads
Secure Experience

Guaranteed safe checkout.

At DumpsArena, your shopping security is our priority. We utilize high-security SSL encryption, ensuring that every purchase is 100% secure.

SECURED CHECKOUT
Need Help?

Feel free to contact us anytime!

Contact Support