CWSP-206: CWSP Certified Wireless Security Professional

CWSP-206: CWSP Certified Wireless Security Professional

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.

$14.99 / $24.99

Course Introduction

  • 1. Introduction
    1m 35s
  • 2. Instructor Introduction
    1m 42s

Module 01 - WLAN Security Overview

  • 1. WLAN Security Overview
    1m 40s
  • 2. Where We Came From
    2m 26s
  • 3. Standards Organizations
    1m 31s
  • 4. ISO and the OSI
    10m 25s
  • 5. ISOC Hierarchy
    3m
  • 6. Wi-Fi Alliance Standards
    7m 2s
  • 7. 802.11 Networking Basics Part1
    1m 28s
  • 8. 802.11 Networking Basics Part2
    2m 43s
  • 9. Connection Types
    2m 8s
  • 10. 802.11 Security Basics
    1m 54s
  • 11. Data Privacy Part1
    1m 48s
  • 12. Data Privacy Part2
    3m 14s
  • 13. AAA
    1m 33s
  • 14. Segmentation
    3m 46s
  • 15. Monitoring
    1m 42s
  • 16. Policy
    1m 19s
  • 17. Security History
    51s
  • 18. 802.11i and WPA Part1
    45s
  • 19. 802.11i and WPA Part2
    1m 37s
  • 20. 802.11i and WPA Part3
    2m 35s
  • 21. RSN (Robust Security Network)
    54s
  • 22. Future of 802.11 Security Part1
    1m 44s
  • 23. Future of 802.11 Security Part2
    1m 30s
  • 24. Demo - Networking Basics
    4m 45s
  • 25. Demo - Web GUI Introduction
    5m 13s
  • 26. Demo - Security Options
    3m 13s
  • 27. Module 01 Review
    49s

Module 02 - Legacy Security

  • 1. Legacy Security
    48s
  • 2. Authentication
    1m
  • 3. Open System Authentication
    2m 31s
  • 4. WEP Encryption
    4m 9s
  • 5. Shared Key Authentication
    2m 26s
  • 6. More About WEP Part1
    6m 5s
  • 7. More About WEP Part2
    8m 58s
  • 8. Attacks Against WEP
    6m 19s
  • 9. VPNs Part1
    3m 26s
  • 10. VPNs Part2
    6m 19s
  • 11. VPN Tunneling Protocols
    1m 49s
  • 12. MAC Filters
    2m 36s
  • 13. SSID Segmentation
    4m 26s
  • 14. SSID Cloaking
    1m 58s
  • 15. Demo - Security Associations
    9m 39s
  • 16. Demo - Security Associations Part A
    4m 39s
  • 17. Demo - Security Associations Part B
    5m
  • 18. Demo - MAC Spoofing
    6m 49s
  • 19. Module 02 Review
    40s

Module 03 - Encryption Ciphers and Methods

  • 1. Encryption Ciphers and Methods
    37s
  • 2. Encryption Basics
    8m 18s
  • 3. Stream and Block Ciphers
    6m
  • 4. WLAN Encryption Methods
    3m 8s
  • 5. WEP Again
    1m 2s
  • 6. TKIP Part1
    6m 54s
  • 7. TKIP Part2
    7m 31s
  • 8. MIC
    6m 59s
  • 9. TKIP MPDU
    5m 2s
  • 10. CCMP Part1
    3m 49s
  • 11. CCMP Part2
    4m 7s
  • 12. CCMP Part3
    3m 23s
  • 13. CCMP Part4
    2m 24s
  • 14. CCMP Part5
    3m 45s
  • 15. WPA/WPA2
    1m 15s
  • 16. Proprietary Solutions
    51s
  • 17. Demo - Encryption Example
    6m 27s
  • 18. Module 03 Review
    23s

Module 04 - 802.11 Authentication Methods

  • 1. 802.11 Authentication Methods
    43s
  • 2. WLAN Authentication Overview
    8m
  • 3. AAA
    2m 36s
  • 4. Authentication
    7m 11s
  • 5. Authorization
    3m 20s
  • 6. Accounting
    4m 45s
  • 7. 802.1X
    5m 4s
  • 8. Supplicant Credentials
    7m 26s
  • 9. Authentication Server Credentials
    8m 2s
  • 10. EAP
    4m 23s
  • 11. EAP Process
    5m 50s
  • 12. Legacy EAP
    3m 54s
  • 13. Strong EAP Protocols
    4m 48s
  • 14. PACs
    4m 46s
  • 15. Demo - Certificate Authority Server Credentials
    5m 51s
  • 16. Module 04 Review
    41s

Module 05 - Dynamic Encryption Key Generation

  • 1. Dynamic Encryption Key Generation
    1m 7s
  • 2. Dynamic WEP
    5m 59s
  • 3. RSN
    6m 44s
  • 4. Management Frames & RSNIE (eNotes)
    6m 30s
  • 5. RSN (Cont.)
    1m 11s
  • 6. Authentication and Key Management (AKM) Part1
    4m 22s
  • 7. Authentication and Key Management (AKM) Part2
    5m 14s
  • 8. Authentication and Key Management (AKM) Part3
    43s
  • 9. Authentication and Key Management (AKM) Part4
    2m 41s
  • 10. RSNA Key Hierarchy
    2m 23s
  • 11. Master Session Key (MSK)
    2m 23s
  • 12. 4-Way Handshake
    3m 17s
  • 13. Steps of the 4 -way Handshake
    51s
  • 14. Group Key Handshake
    1m 7s
  • 15. PeerKey Handshake
    2m
  • 16. Demo - EAP
    5m 35s
  • 17. Demo - Information Elements
    6m 39s
  • 18. Module 05 Review
    57s

Module 06 - SOHO 802.11 Security

  • 1. SOHO 802.11 Security
    25s
  • 2. Introduction
    4m 48s
  • 3. Why a Passphrase
    7m 32s
  • 4. 4-Way Handshake Again
    5m 54s
  • 5. Risks of WPA/WPA2
    4m 49s
  • 6. Another Risk Factor of WPA/2
    3m 4s
  • 7. Wi -Fi Protected Setup (WPS) Part1
    2m 32s
  • 8. Wi -Fi Protected Setup (WPS) Part2
    4m 25s
  • 9. Wi -Fi Protected Setup (WPS) Part3
    26s
  • 10. Wi -Fi Protected Setup (WPS) Part4
    3m 34s
  • 11. Wi -Fi Protected Setup (WPS) Part5
    1m 2s
  • 12. Initial WLAN Setup
    1m 40s
  • 13. SOHO Best Practices
    5m 56s
  • 14. Demo - Cracking Hashes
    9m 37s
  • 15. Module 06 Review
    39s

Module 07 - Fast Secure Roaming

  • 1. Fast Secure Roaming
    1m 7s
  • 2. History of 802.11 Roaming
    4m 11s
  • 3. Client Roaming Thresholds
    3m 2s
  • 4. AP to AP Handoff (e -notes
    9m 10s
  • 5. Re -Association
    2m 1s
  • 6. Types of APs
    3m 9s
  • 7. RSNA Review
    1m 46s
  • 8. PMKSA
    7m 47s
  • 9. PMK Caching
    1m 58s
  • 10. Pre -authentication
    3m 29s
  • 11. Opportunistic Key Caching (OKC)
    10m 1s
  • 12. Proprietary FSR
    6m 3s
  • 13. FT Key Hierarchy (e -notes)
    9m 8s
  • 14. FT Initial Mobility Domain Association
    2m 17s
  • 15. Over the Air Fast BSS Transition (e -notes)
    6m 7s
  • 16. Over the Air DS Fast BSS Transition (e - notes)
    12m 25s
  • 17. 802.11K -2008
    3m 51s
  • 18. L3 Roaming
    10m 43s
  • 19. Mobile IP
    4m 46s
  • 20. Troubleshooting
    3m 35s
  • 21. Voice Personal and Voice Enterprise
    4m 51s

Module 08 - Wireless Security Risks

  • 1. Wireless Security Risks
    42s
  • 2. Introduction
    26s
  • 3. Rogue Devices Part1
    9m 12s
  • 4. Rogue Devices Part2
    3m 43s
  • 5. Rogue Prevention
    3m 13s
  • 6. Eavesdropping
    4m 41s
  • 7. Authentication Attacks
    1m 16s
  • 8. DoS
    1m 11s
  • 9. L2 DoS
    1m 11s
  • 10. 802.11w
    53s
  • 11. MAC Spoofing
    1m 48s
  • 12. Wireless Hijacking
    2m 43s
  • 13. Peer -to -Peer Attacks
    1m 49s
  • 14. Management Interface Exploits
    2m 42s
  • 15. Physical Damage and Theft
    40s
  • 16. Social Engineering
    46s
  • 17. Public Access and WLAN Hotspots
    38s
  • 18. Demo - Rogue Devices
    4m 26s
  • 19. Demo - Public Hotspots
    6m 32s
  • 20. Module 08 Review
    30s

Module 09 - Wireless LAN Security Auditing

  • 1. Wireless LAN Security Auditing
    19s
  • 2. Purpose of Auditing
    1m 27s
  • 3. WLAN Audits Part1
    1m 52s
  • 4. WLAN Audits Part2
    46s
  • 5. Layer 1 Audit
    5m 13s
  • 6. Layer 2 Audit
    2m 13s
  • 7. Penetration Testing
    3m 57s
  • 8. Wired Infrastructure Audit
    3m 7s
  • 9. Social Engineering
    1m 47s
  • 10. WIPS Audit
    52s
  • 11. Documenting the Audit
    4m 10s
  • 12. Recommendations
    43s
  • 13. WLAN Security Auditing Tools
    1m 32s
  • 14. Module 09 Review
    23s

Module 10 - Wireless Security Monitoring

  • 1. Wireless Security Monitoring
    45s
  • 2. WIDS/WIPS
    1m 2s
  • 3. WIDS/WIPS continue
    6m 23s
  • 4. Sensor Placement
    3m 57s
  • 5. Example of Rogue Detection (e -notes)
    8m 57s
  • 6. Device Tracking
    6m 53s
  • 7. Signature Analysis
    1m 4s
  • 8. Behavioral Analysis
    2m 22s
  • 9. Other Types of Monitoring
    5m 57s
  • 10. More on Monitoring
    52s
  • 11. Module 10 Review
    24s

Module 11 - VPNs, Remote Access and Guest Access Services

  • 1. VPNs, Remote Access and Guest Access Services
    34s
  • 2. VPN Review Part1
    11m 18s
  • 3. VPN Review Part2
    11m
  • 4. Remote Access Part1
    6m 20s
  • 5. Remote Access Part2
    7m 22s
  • 6. Module 11 Review
    22s

Module 12 - WLAN Security Infrastructure

  • 1. WLAN Security Infrastructure
    39s
  • 2. WLAN Architecture
    7m 35s
  • 3. Lightweight or Controller Based APs (e-notes)
    8m 16s
  • 4. Other Controller Based Definitions
    14m 8s
  • 5. Device Management
    6m 58s
  • 6. Management Protocols
    6m 49s
  • 7. Controller Communications
    5m 26s
  • 8. Authorization Servers
    3m 13s
  • 9. Deployment Architectures
    7m 40s
  • 10. Other RADIUS Solutions
    4m 48s
  • 11. RBAC
    4m 18s
  • 12. Other Security Systems
    6m 18s
  • 13. Module 12 Review
    23s

Module 13 - Wireless Security Policies

  • 1. Wireless Security Policies
    21s
  • 2. General Policy Part1
    2m 13s
  • 3. General Policy Part2
    4m 15s
  • 4. Policy Creation
    3m 13s
  • 5. Policy Management
    2m 26s
  • 6. Functional Policy
    2m 52s
  • 7. Password Policy
    1m 40s
  • 8. Other Policies Part1
    3m 33s
  • 9. Other Policies Part2
    2m 18s
  • 10. Government and Industry Regulations
    6m 20s
  • 11. Module 13 Review
    25s
  • 12. Course Closure
    1m 47s
Study4Pass does not provide real Microsoft exam questions. Similarly, Study4Pass does not supply real Amazon exam questions. The materials offered by Study4Pass lack real questions and answers from Cisco's certification exams. The CFA Institute neither endorses nor assures the accuracy or quality of Study4Pass content. CFA® and Chartered Financial Analyst® are registered trademarks held by the CFA Institute.

© study4pass.com 2025. All rights reserved.