CWSP-206: CWSP Certified Wireless Security Professional

CWSP-206: CWSP Certified Wireless Security Professional

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.

$14.99 / $24.99

Course Introduction

  • 1. Introduction
    1m 35s
  • 2. Instructor Introduction
    1m 42s

Module 01 - WLAN Security Overview

  • 1. WLAN Security Overview
    1m 40s
  • 2. Where We Came From
    2m 26s
  • 3. Standards Organizations
    1m 31s
  • 4. ISO and the OSI
    10m 25s
  • 5. ISOC Hierarchy
    3m
  • 6. Wi-Fi Alliance Standards
    7m 2s
  • 7. 802.11 Networking Basics Part1
    1m 28s
  • 8. 802.11 Networking Basics Part2
    2m 43s
  • 9. Connection Types
    2m 8s
  • 10. 802.11 Security Basics
    1m 54s
  • 11. Data Privacy Part1
    1m 48s
  • 12. Data Privacy Part2
    3m 14s
  • 13. AAA
    1m 33s
  • 14. Segmentation
    3m 46s
  • 15. Monitoring
    1m 42s
  • 16. Policy
    1m 19s
  • 17. Security History
    51s
  • 18. 802.11i and WPA Part1
    45s
  • 19. 802.11i and WPA Part2
    1m 37s
  • 20. 802.11i and WPA Part3
    2m 35s
  • 21. RSN (Robust Security Network)
    54s
  • 22. Future of 802.11 Security Part1
    1m 44s
  • 23. Future of 802.11 Security Part2
    1m 30s
  • 24. Demo - Networking Basics
    4m 45s
  • 25. Demo - Web GUI Introduction
    5m 13s
  • 26. Demo - Security Options
    3m 13s
  • 27. Module 01 Review
    49s

Module 02 - Legacy Security

  • 1. Legacy Security
    48s
  • 2. Authentication
    1m
  • 3. Open System Authentication
    2m 31s
  • 4. WEP Encryption
    4m 9s
  • 5. Shared Key Authentication
    2m 26s
  • 6. More About WEP Part1
    6m 5s
  • 7. More About WEP Part2
    8m 58s
  • 8. Attacks Against WEP
    6m 19s
  • 9. VPNs Part1
    3m 26s
  • 10. VPNs Part2
    6m 19s
  • 11. VPN Tunneling Protocols
    1m 49s
  • 12. MAC Filters
    2m 36s
  • 13. SSID Segmentation
    4m 26s
  • 14. SSID Cloaking
    1m 58s
  • 15. Demo - Security Associations
    9m 39s
  • 16. Demo - Security Associations Part A
    4m 39s
  • 17. Demo - Security Associations Part B
    5m
  • 18. Demo - MAC Spoofing
    6m 49s
  • 19. Module 02 Review
    40s

Module 03 - Encryption Ciphers and Methods

  • 1. Encryption Ciphers and Methods
    37s
  • 2. Encryption Basics
    8m 18s
  • 3. Stream and Block Ciphers
    6m
  • 4. WLAN Encryption Methods
    3m 8s
  • 5. WEP Again
    1m 2s
  • 6. TKIP Part1
    6m 54s
  • 7. TKIP Part2
    7m 31s
  • 8. MIC
    6m 59s
  • 9. TKIP MPDU
    5m 2s
  • 10. CCMP Part1
    3m 49s
  • 11. CCMP Part2
    4m 7s
  • 12. CCMP Part3
    3m 23s
  • 13. CCMP Part4
    2m 24s
  • 14. CCMP Part5
    3m 45s
  • 15. WPA/WPA2
    1m 15s
  • 16. Proprietary Solutions
    51s
  • 17. Demo - Encryption Example
    6m 27s
  • 18. Module 03 Review
    23s

Module 04 - 802.11 Authentication Methods

  • 1. 802.11 Authentication Methods
    43s
  • 2. WLAN Authentication Overview
    8m
  • 3. AAA
    2m 36s
  • 4. Authentication
    7m 11s
  • 5. Authorization
    3m 20s
  • 6. Accounting
    4m 45s
  • 7. 802.1X
    5m 4s
  • 8. Supplicant Credentials
    7m 26s
  • 9. Authentication Server Credentials
    8m 2s
  • 10. EAP
    4m 23s
  • 11. EAP Process
    5m 50s
  • 12. Legacy EAP
    3m 54s
  • 13. Strong EAP Protocols
    4m 48s
  • 14. PACs
    4m 46s
  • 15. Demo - Certificate Authority Server Credentials
    5m 51s
  • 16. Module 04 Review
    41s

Module 05 - Dynamic Encryption Key Generation

  • 1. Dynamic Encryption Key Generation
    1m 7s
  • 2. Dynamic WEP
    5m 59s
  • 3. RSN
    6m 44s
  • 4. Management Frames & RSNIE (eNotes)
    6m 30s
  • 5. RSN (Cont.)
    1m 11s
  • 6. Authentication and Key Management (AKM) Part1
    4m 22s
  • 7. Authentication and Key Management (AKM) Part2
    5m 14s
  • 8. Authentication and Key Management (AKM) Part3
    43s
  • 9. Authentication and Key Management (AKM) Part4
    2m 41s
  • 10. RSNA Key Hierarchy
    2m 23s
  • 11. Master Session Key (MSK)
    2m 23s
  • 12. 4-Way Handshake
    3m 17s
  • 13. Steps of the 4 -way Handshake
    51s
  • 14. Group Key Handshake
    1m 7s
  • 15. PeerKey Handshake
    2m
  • 16. Demo - EAP
    5m 35s
  • 17. Demo - Information Elements
    6m 39s
  • 18. Module 05 Review
    57s

Module 06 - SOHO 802.11 Security

  • 1. SOHO 802.11 Security
    25s
  • 2. Introduction
    4m 48s
  • 3. Why a Passphrase
    7m 32s
  • 4. 4-Way Handshake Again
    5m 54s
  • 5. Risks of WPA/WPA2
    4m 49s
  • 6. Another Risk Factor of WPA/2
    3m 4s
  • 7. Wi -Fi Protected Setup (WPS) Part1
    2m 32s
  • 8. Wi -Fi Protected Setup (WPS) Part2
    4m 25s
  • 9. Wi -Fi Protected Setup (WPS) Part3
    26s
  • 10. Wi -Fi Protected Setup (WPS) Part4
    3m 34s
  • 11. Wi -Fi Protected Setup (WPS) Part5
    1m 2s
  • 12. Initial WLAN Setup
    1m 40s
  • 13. SOHO Best Practices
    5m 56s
  • 14. Demo - Cracking Hashes
    9m 37s
  • 15. Module 06 Review
    39s

Module 07 - Fast Secure Roaming

  • 1. Fast Secure Roaming
    1m 7s
  • 2. History of 802.11 Roaming
    4m 11s
  • 3. Client Roaming Thresholds
    3m 2s
  • 4. AP to AP Handoff (e -notes
    9m 10s
  • 5. Re -Association
    2m 1s
  • 6. Types of APs
    3m 9s
  • 7. RSNA Review
    1m 46s
  • 8. PMKSA
    7m 47s
  • 9. PMK Caching
    1m 58s
  • 10. Pre -authentication
    3m 29s
  • 11. Opportunistic Key Caching (OKC)
    10m 1s
  • 12. Proprietary FSR
    6m 3s
  • 13. FT Key Hierarchy (e -notes)
    9m 8s
  • 14. FT Initial Mobility Domain Association
    2m 17s
  • 15. Over the Air Fast BSS Transition (e -notes)
    6m 7s
  • 16. Over the Air DS Fast BSS Transition (e - notes)
    12m 25s
  • 17. 802.11K -2008
    3m 51s
  • 18. L3 Roaming
    10m 43s
  • 19. Mobile IP
    4m 46s
  • 20. Troubleshooting
    3m 35s
  • 21. Voice Personal and Voice Enterprise
    4m 51s

Module 08 - Wireless Security Risks

  • 1. Wireless Security Risks
    42s
  • 2. Introduction
    26s
  • 3. Rogue Devices Part1
    9m 12s
  • 4. Rogue Devices Part2
    3m 43s
  • 5. Rogue Prevention
    3m 13s
  • 6. Eavesdropping
    4m 41s
  • 7. Authentication Attacks
    1m 16s
  • 8. DoS
    1m 11s
  • 9. L2 DoS
    1m 11s
  • 10. 802.11w
    53s
  • 11. MAC Spoofing
    1m 48s
  • 12. Wireless Hijacking
    2m 43s
  • 13. Peer -to -Peer Attacks
    1m 49s
  • 14. Management Interface Exploits
    2m 42s
  • 15. Physical Damage and Theft
    40s
  • 16. Social Engineering
    46s
  • 17. Public Access and WLAN Hotspots
    38s
  • 18. Demo - Rogue Devices
    4m 26s
  • 19. Demo - Public Hotspots
    6m 32s
  • 20. Module 08 Review
    30s

Module 09 - Wireless LAN Security Auditing

  • 1. Wireless LAN Security Auditing
    19s
  • 2. Purpose of Auditing
    1m 27s
  • 3. WLAN Audits Part1
    1m 52s
  • 4. WLAN Audits Part2
    46s
  • 5. Layer 1 Audit
    5m 13s
  • 6. Layer 2 Audit
    2m 13s
  • 7. Penetration Testing
    3m 57s
  • 8. Wired Infrastructure Audit
    3m 7s
  • 9. Social Engineering
    1m 47s
  • 10. WIPS Audit
    52s
  • 11. Documenting the Audit
    4m 10s
  • 12. Recommendations
    43s
  • 13. WLAN Security Auditing Tools
    1m 32s
  • 14. Module 09 Review
    23s

Module 10 - Wireless Security Monitoring

  • 1. Wireless Security Monitoring
    45s
  • 2. WIDS/WIPS
    1m 2s
  • 3. WIDS/WIPS continue
    6m 23s
  • 4. Sensor Placement
    3m 57s
  • 5. Example of Rogue Detection (e -notes)
    8m 57s
  • 6. Device Tracking
    6m 53s
  • 7. Signature Analysis
    1m 4s
  • 8. Behavioral Analysis
    2m 22s
  • 9. Other Types of Monitoring
    5m 57s
  • 10. More on Monitoring
    52s
  • 11. Module 10 Review
    24s

Module 11 - VPNs, Remote Access and Guest Access Services

  • 1. VPNs, Remote Access and Guest Access Services
    34s
  • 2. VPN Review Part1
    11m 18s
  • 3. VPN Review Part2
    11m
  • 4. Remote Access Part1
    6m 20s
  • 5. Remote Access Part2
    7m 22s
  • 6. Module 11 Review
    22s

Module 12 - WLAN Security Infrastructure

  • 1. WLAN Security Infrastructure
    39s
  • 2. WLAN Architecture
    7m 35s
  • 3. Lightweight or Controller Based APs (e-notes)
    8m 16s
  • 4. Other Controller Based Definitions
    14m 8s
  • 5. Device Management
    6m 58s
  • 6. Management Protocols
    6m 49s
  • 7. Controller Communications
    5m 26s
  • 8. Authorization Servers
    3m 13s
  • 9. Deployment Architectures
    7m 40s
  • 10. Other RADIUS Solutions
    4m 48s
  • 11. RBAC
    4m 18s
  • 12. Other Security Systems
    6m 18s
  • 13. Module 12 Review
    23s

Module 13 - Wireless Security Policies

  • 1. Wireless Security Policies
    21s
  • 2. General Policy Part1
    2m 13s
  • 3. General Policy Part2
    4m 15s
  • 4. Policy Creation
    3m 13s
  • 5. Policy Management
    2m 26s
  • 6. Functional Policy
    2m 52s
  • 7. Password Policy
    1m 40s
  • 8. Other Policies Part1
    3m 33s
  • 9. Other Policies Part2
    2m 18s
  • 10. Government and Industry Regulations
    6m 20s
  • 11. Module 13 Review
    25s
  • 12. Course Closure
    1m 47s