CWSP-206: CWSP Certified Wireless Security Professional

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
$14.99 / $24.99
Course Introduction
-
1. Introduction1m 35s
-
2. Instructor Introduction1m 42s
Module 01 - WLAN Security Overview
-
1. WLAN Security Overview1m 40s
-
2. Where We Came From2m 26s
-
3. Standards Organizations1m 31s
-
4. ISO and the OSI10m 25s
-
5. ISOC Hierarchy3m
-
6. Wi-Fi Alliance Standards7m 2s
-
7. 802.11 Networking Basics Part11m 28s
-
8. 802.11 Networking Basics Part22m 43s
-
9. Connection Types2m 8s
-
10. 802.11 Security Basics1m 54s
-
11. Data Privacy Part11m 48s
-
12. Data Privacy Part23m 14s
-
13. AAA1m 33s
-
14. Segmentation3m 46s
-
15. Monitoring1m 42s
-
16. Policy1m 19s
-
17. Security History51s
-
18. 802.11i and WPA Part145s
-
19. 802.11i and WPA Part21m 37s
-
20. 802.11i and WPA Part32m 35s
-
21. RSN (Robust Security Network)54s
-
22. Future of 802.11 Security Part11m 44s
-
23. Future of 802.11 Security Part21m 30s
-
24. Demo - Networking Basics4m 45s
-
25. Demo - Web GUI Introduction5m 13s
-
26. Demo - Security Options3m 13s
-
27. Module 01 Review49s
Module 02 - Legacy Security
-
1. Legacy Security48s
-
2. Authentication1m
-
3. Open System Authentication2m 31s
-
4. WEP Encryption4m 9s
-
5. Shared Key Authentication2m 26s
-
6. More About WEP Part16m 5s
-
7. More About WEP Part28m 58s
-
8. Attacks Against WEP6m 19s
-
9. VPNs Part13m 26s
-
10. VPNs Part26m 19s
-
11. VPN Tunneling Protocols1m 49s
-
12. MAC Filters2m 36s
-
13. SSID Segmentation4m 26s
-
14. SSID Cloaking1m 58s
-
15. Demo - Security Associations9m 39s
-
16. Demo - Security Associations Part A4m 39s
-
17. Demo - Security Associations Part B5m
-
18. Demo - MAC Spoofing6m 49s
-
19. Module 02 Review40s
Module 03 - Encryption Ciphers and Methods
-
1. Encryption Ciphers and Methods37s
-
2. Encryption Basics8m 18s
-
3. Stream and Block Ciphers6m
-
4. WLAN Encryption Methods3m 8s
-
5. WEP Again1m 2s
-
6. TKIP Part16m 54s
-
7. TKIP Part27m 31s
-
8. MIC6m 59s
-
9. TKIP MPDU5m 2s
-
10. CCMP Part13m 49s
-
11. CCMP Part24m 7s
-
12. CCMP Part33m 23s
-
13. CCMP Part42m 24s
-
14. CCMP Part53m 45s
-
15. WPA/WPA21m 15s
-
16. Proprietary Solutions51s
-
17. Demo - Encryption Example6m 27s
-
18. Module 03 Review23s
Module 04 - 802.11 Authentication Methods
-
1. 802.11 Authentication Methods43s
-
2. WLAN Authentication Overview8m
-
3. AAA2m 36s
-
4. Authentication7m 11s
-
5. Authorization3m 20s
-
6. Accounting4m 45s
-
7. 802.1X5m 4s
-
8. Supplicant Credentials7m 26s
-
9. Authentication Server Credentials8m 2s
-
10. EAP4m 23s
-
11. EAP Process5m 50s
-
12. Legacy EAP3m 54s
-
13. Strong EAP Protocols4m 48s
-
14. PACs4m 46s
-
15. Demo - Certificate Authority Server Credentials5m 51s
-
16. Module 04 Review41s
Module 05 - Dynamic Encryption Key Generation
-
1. Dynamic Encryption Key Generation1m 7s
-
2. Dynamic WEP5m 59s
-
3. RSN6m 44s
-
4. Management Frames & RSNIE (eNotes)6m 30s
-
5. RSN (Cont.)1m 11s
-
6. Authentication and Key Management (AKM) Part14m 22s
-
7. Authentication and Key Management (AKM) Part25m 14s
-
8. Authentication and Key Management (AKM) Part343s
-
9. Authentication and Key Management (AKM) Part42m 41s
-
10. RSNA Key Hierarchy2m 23s
-
11. Master Session Key (MSK)2m 23s
-
12. 4-Way Handshake3m 17s
-
13. Steps of the 4 -way Handshake51s
-
14. Group Key Handshake1m 7s
-
15. PeerKey Handshake2m
-
16. Demo - EAP5m 35s
-
17. Demo - Information Elements6m 39s
-
18. Module 05 Review57s
Module 06 - SOHO 802.11 Security
-
1. SOHO 802.11 Security25s
-
2. Introduction4m 48s
-
3. Why a Passphrase7m 32s
-
4. 4-Way Handshake Again5m 54s
-
5. Risks of WPA/WPA24m 49s
-
6. Another Risk Factor of WPA/23m 4s
-
7. Wi -Fi Protected Setup (WPS) Part12m 32s
-
8. Wi -Fi Protected Setup (WPS) Part24m 25s
-
9. Wi -Fi Protected Setup (WPS) Part326s
-
10. Wi -Fi Protected Setup (WPS) Part43m 34s
-
11. Wi -Fi Protected Setup (WPS) Part51m 2s
-
12. Initial WLAN Setup1m 40s
-
13. SOHO Best Practices5m 56s
-
14. Demo - Cracking Hashes9m 37s
-
15. Module 06 Review39s
Module 07 - Fast Secure Roaming
-
1. Fast Secure Roaming1m 7s
-
2. History of 802.11 Roaming4m 11s
-
3. Client Roaming Thresholds3m 2s
-
4. AP to AP Handoff (e -notes9m 10s
-
5. Re -Association2m 1s
-
6. Types of APs3m 9s
-
7. RSNA Review1m 46s
-
8. PMKSA7m 47s
-
9. PMK Caching1m 58s
-
10. Pre -authentication3m 29s
-
11. Opportunistic Key Caching (OKC)10m 1s
-
12. Proprietary FSR6m 3s
-
13. FT Key Hierarchy (e -notes)9m 8s
-
14. FT Initial Mobility Domain Association2m 17s
-
15. Over the Air Fast BSS Transition (e -notes)6m 7s
-
16. Over the Air DS Fast BSS Transition (e - notes)12m 25s
-
17. 802.11K -20083m 51s
-
18. L3 Roaming10m 43s
-
19. Mobile IP4m 46s
-
20. Troubleshooting3m 35s
-
21. Voice Personal and Voice Enterprise4m 51s
Module 08 - Wireless Security Risks
-
1. Wireless Security Risks42s
-
2. Introduction26s
-
3. Rogue Devices Part19m 12s
-
4. Rogue Devices Part23m 43s
-
5. Rogue Prevention3m 13s
-
6. Eavesdropping4m 41s
-
7. Authentication Attacks1m 16s
-
8. DoS1m 11s
-
9. L2 DoS1m 11s
-
10. 802.11w53s
-
11. MAC Spoofing1m 48s
-
12. Wireless Hijacking2m 43s
-
13. Peer -to -Peer Attacks1m 49s
-
14. Management Interface Exploits2m 42s
-
15. Physical Damage and Theft40s
-
16. Social Engineering46s
-
17. Public Access and WLAN Hotspots38s
-
18. Demo - Rogue Devices4m 26s
-
19. Demo - Public Hotspots6m 32s
-
20. Module 08 Review30s
Module 09 - Wireless LAN Security Auditing
-
1. Wireless LAN Security Auditing19s
-
2. Purpose of Auditing1m 27s
-
3. WLAN Audits Part11m 52s
-
4. WLAN Audits Part246s
-
5. Layer 1 Audit5m 13s
-
6. Layer 2 Audit2m 13s
-
7. Penetration Testing3m 57s
-
8. Wired Infrastructure Audit3m 7s
-
9. Social Engineering1m 47s
-
10. WIPS Audit52s
-
11. Documenting the Audit4m 10s
-
12. Recommendations43s
-
13. WLAN Security Auditing Tools1m 32s
-
14. Module 09 Review23s
Module 10 - Wireless Security Monitoring
-
1. Wireless Security Monitoring45s
-
2. WIDS/WIPS1m 2s
-
3. WIDS/WIPS continue6m 23s
-
4. Sensor Placement3m 57s
-
5. Example of Rogue Detection (e -notes)8m 57s
-
6. Device Tracking6m 53s
-
7. Signature Analysis1m 4s
-
8. Behavioral Analysis2m 22s
-
9. Other Types of Monitoring5m 57s
-
10. More on Monitoring52s
-
11. Module 10 Review24s
Module 11 - VPNs, Remote Access and Guest Access Services
-
1. VPNs, Remote Access and Guest Access Services34s
-
2. VPN Review Part111m 18s
-
3. VPN Review Part211m
-
4. Remote Access Part16m 20s
-
5. Remote Access Part27m 22s
-
6. Module 11 Review22s
Module 12 - WLAN Security Infrastructure
-
1. WLAN Security Infrastructure39s
-
2. WLAN Architecture7m 35s
-
3. Lightweight or Controller Based APs (e-notes)8m 16s
-
4. Other Controller Based Definitions14m 8s
-
5. Device Management6m 58s
-
6. Management Protocols6m 49s
-
7. Controller Communications5m 26s
-
8. Authorization Servers3m 13s
-
9. Deployment Architectures7m 40s
-
10. Other RADIUS Solutions4m 48s
-
11. RBAC4m 18s
-
12. Other Security Systems6m 18s
-
13. Module 12 Review23s
Module 13 - Wireless Security Policies
-
1. Wireless Security Policies21s
-
2. General Policy Part12m 13s
-
3. General Policy Part24m 15s
-
4. Policy Creation3m 13s
-
5. Policy Management2m 26s
-
6. Functional Policy2m 52s
-
7. Password Policy1m 40s
-
8. Other Policies Part13m 33s
-
9. Other Policies Part22m 18s
-
10. Government and Industry Regulations6m 20s
-
11. Module 13 Review25s
-
12. Course Closure1m 47s