CWSP-206: CWSP Certified Wireless Security Professional

What’s included
$14.99 / $24.99
Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
Pay once, own it forever
Video Courses
Course Introduction
Lectures | Duration |
---|---|
1. Introduction | 1m 35s |
2. Instructor Introduction | 1m 42s |
1. Introduction
1m 35s
2. Instructor Introduction
1m 42s
Module 01 - WLAN Security Overview
Lectures | Duration |
---|---|
1. WLAN Security Overview | 1m 40s |
2. Where We Came From | 2m 26s |
3. Standards Organizations | 1m 31s |
4. ISO and the OSI | 10m 25s |
5. ISOC Hierarchy | 3m |
6. Wi-Fi Alliance Standards | 7m 2s |
7. 802.11 Networking Basics Part1 | 1m 28s |
8. 802.11 Networking Basics Part2 | 2m 43s |
9. Connection Types | 2m 8s |
10. 802.11 Security Basics | 1m 54s |
11. Data Privacy Part1 | 1m 48s |
12. Data Privacy Part2 | 3m 14s |
13. AAA | 1m 33s |
14. Segmentation | 3m 46s |
15. Monitoring | 1m 42s |
16. Policy | 1m 19s |
17. Security History | 51s |
18. 802.11i and WPA Part1 | 45s |
19. 802.11i and WPA Part2 | 1m 37s |
20. 802.11i and WPA Part3 | 2m 35s |
21. RSN (Robust Security Network) | 54s |
22. Future of 802.11 Security Part1 | 1m 44s |
23. Future of 802.11 Security Part2 | 1m 30s |
24. Demo - Networking Basics | 4m 45s |
25. Demo - Web GUI Introduction | 5m 13s |
26. Demo - Security Options | 3m 13s |
27. Module 01 Review | 49s |
1. WLAN Security Overview
1m 40s
2. Where We Came From
2m 26s
3. Standards Organizations
1m 31s
4. ISO and the OSI
10m 25s
5. ISOC Hierarchy
3m
6. Wi-Fi Alliance Standards
7m 2s
7. 802.11 Networking Basics Part1
1m 28s
8. 802.11 Networking Basics Part2
2m 43s
9. Connection Types
2m 8s
10. 802.11 Security Basics
1m 54s
11. Data Privacy Part1
1m 48s
12. Data Privacy Part2
3m 14s
13. AAA
1m 33s
14. Segmentation
3m 46s
15. Monitoring
1m 42s
16. Policy
1m 19s
17. Security History
51s
18. 802.11i and WPA Part1
45s
19. 802.11i and WPA Part2
1m 37s
20. 802.11i and WPA Part3
2m 35s
21. RSN (Robust Security Network)
54s
22. Future of 802.11 Security Part1
1m 44s
23. Future of 802.11 Security Part2
1m 30s
24. Demo - Networking Basics
4m 45s
25. Demo - Web GUI Introduction
5m 13s
26. Demo - Security Options
3m 13s
27. Module 01 Review
49s
Module 02 - Legacy Security
Lectures | Duration |
---|---|
1. Legacy Security | 48s |
2. Authentication | 1m |
3. Open System Authentication | 2m 31s |
4. WEP Encryption | 4m 9s |
5. Shared Key Authentication | 2m 26s |
6. More About WEP Part1 | 6m 5s |
7. More About WEP Part2 | 8m 58s |
8. Attacks Against WEP | 6m 19s |
9. VPNs Part1 | 3m 26s |
10. VPNs Part2 | 6m 19s |
11. VPN Tunneling Protocols | 1m 49s |
12. MAC Filters | 2m 36s |
13. SSID Segmentation | 4m 26s |
14. SSID Cloaking | 1m 58s |
15. Demo - Security Associations | 9m 39s |
16. Demo - Security Associations Part A | 4m 39s |
17. Demo - Security Associations Part B | 5m |
18. Demo - MAC Spoofing | 6m 49s |
19. Module 02 Review | 40s |
1. Legacy Security
48s
2. Authentication
1m
3. Open System Authentication
2m 31s
4. WEP Encryption
4m 9s
5. Shared Key Authentication
2m 26s
6. More About WEP Part1
6m 5s
7. More About WEP Part2
8m 58s
8. Attacks Against WEP
6m 19s
9. VPNs Part1
3m 26s
10. VPNs Part2
6m 19s
11. VPN Tunneling Protocols
1m 49s
12. MAC Filters
2m 36s
13. SSID Segmentation
4m 26s
14. SSID Cloaking
1m 58s
15. Demo - Security Associations
9m 39s
16. Demo - Security Associations Part A
4m 39s
17. Demo - Security Associations Part B
5m
18. Demo - MAC Spoofing
6m 49s
19. Module 02 Review
40s
Module 03 - Encryption Ciphers and Methods
Lectures | Duration |
---|---|
1. Encryption Ciphers and Methods | 37s |
2. Encryption Basics | 8m 18s |
3. Stream and Block Ciphers | 6m |
4. WLAN Encryption Methods | 3m 8s |
5. WEP Again | 1m 2s |
6. TKIP Part1 | 6m 54s |
7. TKIP Part2 | 7m 31s |
8. MIC | 6m 59s |
9. TKIP MPDU | 5m 2s |
10. CCMP Part1 | 3m 49s |
11. CCMP Part2 | 4m 7s |
12. CCMP Part3 | 3m 23s |
13. CCMP Part4 | 2m 24s |
14. CCMP Part5 | 3m 45s |
15. WPA/WPA2 | 1m 15s |
16. Proprietary Solutions | 51s |
17. Demo - Encryption Example | 6m 27s |
18. Module 03 Review | 23s |
1. Encryption Ciphers and Methods
37s
2. Encryption Basics
8m 18s
3. Stream and Block Ciphers
6m
4. WLAN Encryption Methods
3m 8s
5. WEP Again
1m 2s
6. TKIP Part1
6m 54s
7. TKIP Part2
7m 31s
8. MIC
6m 59s
9. TKIP MPDU
5m 2s
10. CCMP Part1
3m 49s
11. CCMP Part2
4m 7s
12. CCMP Part3
3m 23s
13. CCMP Part4
2m 24s
14. CCMP Part5
3m 45s
15. WPA/WPA2
1m 15s
16. Proprietary Solutions
51s
17. Demo - Encryption Example
6m 27s
18. Module 03 Review
23s
Module 04 - 802.11 Authentication Methods
Lectures | Duration |
---|---|
1. 802.11 Authentication Methods | 43s |
2. WLAN Authentication Overview | 8m |
3. AAA | 2m 36s |
4. Authentication | 7m 11s |
5. Authorization | 3m 20s |
6. Accounting | 4m 45s |
7. 802.1X | 5m 4s |
8. Supplicant Credentials | 7m 26s |
9. Authentication Server Credentials | 8m 2s |
10. EAP | 4m 23s |
11. EAP Process | 5m 50s |
12. Legacy EAP | 3m 54s |
13. Strong EAP Protocols | 4m 48s |
14. PACs | 4m 46s |
15. Demo - Certificate Authority Server Credentials | 5m 51s |
16. Module 04 Review | 41s |
1. 802.11 Authentication Methods
43s
2. WLAN Authentication Overview
8m
3. AAA
2m 36s
4. Authentication
7m 11s
5. Authorization
3m 20s
6. Accounting
4m 45s
7. 802.1X
5m 4s
8. Supplicant Credentials
7m 26s
9. Authentication Server Credentials
8m 2s
10. EAP
4m 23s
11. EAP Process
5m 50s
12. Legacy EAP
3m 54s
13. Strong EAP Protocols
4m 48s
14. PACs
4m 46s
15. Demo - Certificate Authority Server Credentials
5m 51s
16. Module 04 Review
41s
Module 05 - Dynamic Encryption Key Generation
Lectures | Duration |
---|---|
1. Dynamic Encryption Key Generation | 1m 7s |
2. Dynamic WEP | 5m 59s |
3. RSN | 6m 44s |
4. Management Frames & RSNIE (eNotes) | 6m 30s |
5. RSN (Cont.) | 1m 11s |
6. Authentication and Key Management (AKM) Part1 | 4m 22s |
7. Authentication and Key Management (AKM) Part2 | 5m 14s |
8. Authentication and Key Management (AKM) Part3 | 43s |
9. Authentication and Key Management (AKM) Part4 | 2m 41s |
10. RSNA Key Hierarchy | 2m 23s |
11. Master Session Key (MSK) | 2m 23s |
12. 4-Way Handshake | 3m 17s |
13. Steps of the 4 -way Handshake | 51s |
14. Group Key Handshake | 1m 7s |
15. PeerKey Handshake | 2m |
16. Demo - EAP | 5m 35s |
17. Demo - Information Elements | 6m 39s |
18. Module 05 Review | 57s |
1. Dynamic Encryption Key Generation
1m 7s
2. Dynamic WEP
5m 59s
3. RSN
6m 44s
4. Management Frames & RSNIE (eNotes)
6m 30s
5. RSN (Cont.)
1m 11s
6. Authentication and Key Management (AKM) Part1
4m 22s
7. Authentication and Key Management (AKM) Part2
5m 14s
8. Authentication and Key Management (AKM) Part3
43s
9. Authentication and Key Management (AKM) Part4
2m 41s
10. RSNA Key Hierarchy
2m 23s
11. Master Session Key (MSK)
2m 23s
12. 4-Way Handshake
3m 17s
13. Steps of the 4 -way Handshake
51s
14. Group Key Handshake
1m 7s
15. PeerKey Handshake
2m
16. Demo - EAP
5m 35s
17. Demo - Information Elements
6m 39s
18. Module 05 Review
57s
Module 06 - SOHO 802.11 Security
Lectures | Duration |
---|---|
1. SOHO 802.11 Security | 25s |
2. Introduction | 4m 48s |
3. Why a Passphrase | 7m 32s |
4. 4-Way Handshake Again | 5m 54s |
5. Risks of WPA/WPA2 | 4m 49s |
6. Another Risk Factor of WPA/2 | 3m 4s |
7. Wi -Fi Protected Setup (WPS) Part1 | 2m 32s |
8. Wi -Fi Protected Setup (WPS) Part2 | 4m 25s |
9. Wi -Fi Protected Setup (WPS) Part3 | 26s |
10. Wi -Fi Protected Setup (WPS) Part4 | 3m 34s |
11. Wi -Fi Protected Setup (WPS) Part5 | 1m 2s |
12. Initial WLAN Setup | 1m 40s |
13. SOHO Best Practices | 5m 56s |
14. Demo - Cracking Hashes | 9m 37s |
15. Module 06 Review | 39s |
1. SOHO 802.11 Security
25s
2. Introduction
4m 48s
3. Why a Passphrase
7m 32s
4. 4-Way Handshake Again
5m 54s
5. Risks of WPA/WPA2
4m 49s
6. Another Risk Factor of WPA/2
3m 4s
7. Wi -Fi Protected Setup (WPS) Part1
2m 32s
8. Wi -Fi Protected Setup (WPS) Part2
4m 25s
9. Wi -Fi Protected Setup (WPS) Part3
26s
10. Wi -Fi Protected Setup (WPS) Part4
3m 34s
11. Wi -Fi Protected Setup (WPS) Part5
1m 2s
12. Initial WLAN Setup
1m 40s
13. SOHO Best Practices
5m 56s
14. Demo - Cracking Hashes
9m 37s
15. Module 06 Review
39s
Module 07 - Fast Secure Roaming
Lectures | Duration |
---|---|
1. Fast Secure Roaming | 1m 7s |
2. History of 802.11 Roaming | 4m 11s |
3. Client Roaming Thresholds | 3m 2s |
4. AP to AP Handoff (e -notes | 9m 10s |
5. Re -Association | 2m 1s |
6. Types of APs | 3m 9s |
7. RSNA Review | 1m 46s |
8. PMKSA | 7m 47s |
9. PMK Caching | 1m 58s |
10. Pre -authentication | 3m 29s |
11. Opportunistic Key Caching (OKC) | 10m 1s |
12. Proprietary FSR | 6m 3s |
13. FT Key Hierarchy (e -notes) | 9m 8s |
14. FT Initial Mobility Domain Association | 2m 17s |
15. Over the Air Fast BSS Transition (e -notes) | 6m 7s |
16. Over the Air DS Fast BSS Transition (e - notes) | 12m 25s |
17. 802.11K -2008 | 3m 51s |
18. L3 Roaming | 10m 43s |
19. Mobile IP | 4m 46s |
20. Troubleshooting | 3m 35s |
21. Voice Personal and Voice Enterprise | 4m 51s |
1. Fast Secure Roaming
1m 7s
2. History of 802.11 Roaming
4m 11s
3. Client Roaming Thresholds
3m 2s
4. AP to AP Handoff (e -notes
9m 10s
5. Re -Association
2m 1s
6. Types of APs
3m 9s
7. RSNA Review
1m 46s
8. PMKSA
7m 47s
9. PMK Caching
1m 58s
10. Pre -authentication
3m 29s
11. Opportunistic Key Caching (OKC)
10m 1s
12. Proprietary FSR
6m 3s
13. FT Key Hierarchy (e -notes)
9m 8s
14. FT Initial Mobility Domain Association
2m 17s
15. Over the Air Fast BSS Transition (e -notes)
6m 7s
16. Over the Air DS Fast BSS Transition (e - notes)
12m 25s
17. 802.11K -2008
3m 51s
18. L3 Roaming
10m 43s
19. Mobile IP
4m 46s
20. Troubleshooting
3m 35s
21. Voice Personal and Voice Enterprise
4m 51s
Module 08 - Wireless Security Risks
Lectures | Duration |
---|---|
1. Wireless Security Risks | 42s |
2. Introduction | 26s |
3. Rogue Devices Part1 | 9m 12s |
4. Rogue Devices Part2 | 3m 43s |
5. Rogue Prevention | 3m 13s |
6. Eavesdropping | 4m 41s |
7. Authentication Attacks | 1m 16s |
8. DoS | 1m 11s |
9. L2 DoS | 1m 11s |
10. 802.11w | 53s |
11. MAC Spoofing | 1m 48s |
12. Wireless Hijacking | 2m 43s |
13. Peer -to -Peer Attacks | 1m 49s |
14. Management Interface Exploits | 2m 42s |
15. Physical Damage and Theft | 40s |
16. Social Engineering | 46s |
17. Public Access and WLAN Hotspots | 38s |
18. Demo - Rogue Devices | 4m 26s |
19. Demo - Public Hotspots | 6m 32s |
20. Module 08 Review | 30s |
1. Wireless Security Risks
42s
2. Introduction
26s
3. Rogue Devices Part1
9m 12s
4. Rogue Devices Part2
3m 43s
5. Rogue Prevention
3m 13s
6. Eavesdropping
4m 41s
7. Authentication Attacks
1m 16s
8. DoS
1m 11s
9. L2 DoS
1m 11s
10. 802.11w
53s
11. MAC Spoofing
1m 48s
12. Wireless Hijacking
2m 43s
13. Peer -to -Peer Attacks
1m 49s
14. Management Interface Exploits
2m 42s
15. Physical Damage and Theft
40s
16. Social Engineering
46s
17. Public Access and WLAN Hotspots
38s
18. Demo - Rogue Devices
4m 26s
19. Demo - Public Hotspots
6m 32s
20. Module 08 Review
30s
Module 09 - Wireless LAN Security Auditing
Lectures | Duration |
---|---|
1. Wireless LAN Security Auditing | 19s |
2. Purpose of Auditing | 1m 27s |
3. WLAN Audits Part1 | 1m 52s |
4. WLAN Audits Part2 | 46s |
5. Layer 1 Audit | 5m 13s |
6. Layer 2 Audit | 2m 13s |
7. Penetration Testing | 3m 57s |
8. Wired Infrastructure Audit | 3m 7s |
9. Social Engineering | 1m 47s |
10. WIPS Audit | 52s |
11. Documenting the Audit | 4m 10s |
12. Recommendations | 43s |
13. WLAN Security Auditing Tools | 1m 32s |
14. Module 09 Review | 23s |
1. Wireless LAN Security Auditing
19s
2. Purpose of Auditing
1m 27s
3. WLAN Audits Part1
1m 52s
4. WLAN Audits Part2
46s
5. Layer 1 Audit
5m 13s
6. Layer 2 Audit
2m 13s
7. Penetration Testing
3m 57s
8. Wired Infrastructure Audit
3m 7s
9. Social Engineering
1m 47s
10. WIPS Audit
52s
11. Documenting the Audit
4m 10s
12. Recommendations
43s
13. WLAN Security Auditing Tools
1m 32s
14. Module 09 Review
23s
Module 10 - Wireless Security Monitoring
Lectures | Duration |
---|---|
1. Wireless Security Monitoring | 45s |
2. WIDS/WIPS | 1m 2s |
3. WIDS/WIPS continue | 6m 23s |
4. Sensor Placement | 3m 57s |
5. Example of Rogue Detection (e -notes) | 8m 57s |
6. Device Tracking | 6m 53s |
7. Signature Analysis | 1m 4s |
8. Behavioral Analysis | 2m 22s |
9. Other Types of Monitoring | 5m 57s |
10. More on Monitoring | 52s |
11. Module 10 Review | 24s |
1. Wireless Security Monitoring
45s
2. WIDS/WIPS
1m 2s
3. WIDS/WIPS continue
6m 23s
4. Sensor Placement
3m 57s
5. Example of Rogue Detection (e -notes)
8m 57s
6. Device Tracking
6m 53s
7. Signature Analysis
1m 4s
8. Behavioral Analysis
2m 22s
9. Other Types of Monitoring
5m 57s
10. More on Monitoring
52s
11. Module 10 Review
24s
Module 11 - VPNs, Remote Access and Guest Access Services
Lectures | Duration |
---|---|
1. VPNs, Remote Access and Guest Access Services | 34s |
2. VPN Review Part1 | 11m 18s |
3. VPN Review Part2 | 11m |
4. Remote Access Part1 | 6m 20s |
5. Remote Access Part2 | 7m 22s |
6. Module 11 Review | 22s |
1. VPNs, Remote Access and Guest Access Services
34s
2. VPN Review Part1
11m 18s
3. VPN Review Part2
11m
4. Remote Access Part1
6m 20s
5. Remote Access Part2
7m 22s
6. Module 11 Review
22s
Module 12 - WLAN Security Infrastructure
Lectures | Duration |
---|---|
1. WLAN Security Infrastructure | 39s |
2. WLAN Architecture | 7m 35s |
3. Lightweight or Controller Based APs (e-notes) | 8m 16s |
4. Other Controller Based Definitions | 14m 8s |
5. Device Management | 6m 58s |
6. Management Protocols | 6m 49s |
7. Controller Communications | 5m 26s |
8. Authorization Servers | 3m 13s |
9. Deployment Architectures | 7m 40s |
10. Other RADIUS Solutions | 4m 48s |
11. RBAC | 4m 18s |
12. Other Security Systems | 6m 18s |
13. Module 12 Review | 23s |
1. WLAN Security Infrastructure
39s
2. WLAN Architecture
7m 35s
3. Lightweight or Controller Based APs (e-notes)
8m 16s
4. Other Controller Based Definitions
14m 8s
5. Device Management
6m 58s
6. Management Protocols
6m 49s
7. Controller Communications
5m 26s
8. Authorization Servers
3m 13s
9. Deployment Architectures
7m 40s
10. Other RADIUS Solutions
4m 48s
11. RBAC
4m 18s
12. Other Security Systems
6m 18s
13. Module 12 Review
23s
Module 13 - Wireless Security Policies
Lectures | Duration |
---|---|
1. Wireless Security Policies | 21s |
2. General Policy Part1 | 2m 13s |
3. General Policy Part2 | 4m 15s |
4. Policy Creation | 3m 13s |
5. Policy Management | 2m 26s |
6. Functional Policy | 2m 52s |
7. Password Policy | 1m 40s |
8. Other Policies Part1 | 3m 33s |
9. Other Policies Part2 | 2m 18s |
10. Government and Industry Regulations | 6m 20s |
11. Module 13 Review | 25s |
12. Course Closure | 1m 47s |
1. Wireless Security Policies
21s
2. General Policy Part1
2m 13s
3. General Policy Part2
4m 15s
4. Policy Creation
3m 13s
5. Policy Management
2m 26s
6. Functional Policy
2m 52s
7. Password Policy
1m 40s
8. Other Policies Part1
3m 33s
9. Other Policies Part2
2m 18s
10. Government and Industry Regulations
6m 20s
11. Module 13 Review
25s
12. Course Closure
1m 47s