Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
$14.99/24.99
Lectures |
---|
1. Introduction- 1m 35s |
2. Instructor Introduction- 1m 42s |
Lectures |
---|
1. WLAN Security Overview- 1m 40s |
2. Where We Came From- 2m 26s |
3. Standards Organizations- 1m 31s |
4. ISO and the OSI- 10m 25s |
5. ISOC Hierarchy- 3m |
6. Wi-Fi Alliance Standards- 7m 2s |
7. 802.11 Networking Basics Part1- 1m 28s |
8. 802.11 Networking Basics Part2- 2m 43s |
9. Connection Types- 2m 8s |
10. 802.11 Security Basics- 1m 54s |
11. Data Privacy Part1- 1m 48s |
12. Data Privacy Part2- 3m 14s |
13. AAA- 1m 33s |
14. Segmentation- 3m 46s |
15. Monitoring- 1m 42s |
16. Policy- 1m 19s |
17. Security History- 51s |
18. 802.11i and WPA Part1- 45s |
19. 802.11i and WPA Part2- 1m 37s |
20. 802.11i and WPA Part3- 2m 35s |
21. RSN (Robust Security Network)- 54s |
22. Future of 802.11 Security Part1- 1m 44s |
23. Future of 802.11 Security Part2- 1m 30s |
24. Demo - Networking Basics- 4m 45s |
25. Demo - Web GUI Introduction- 5m 13s |
26. Demo - Security Options- 3m 13s |
27. Module 01 Review- 49s |
Lectures |
---|
1. Legacy Security- 48s |
2. Authentication- 1m |
3. Open System Authentication- 2m 31s |
4. WEP Encryption- 4m 9s |
5. Shared Key Authentication- 2m 26s |
6. More About WEP Part1- 6m 5s |
7. More About WEP Part2- 8m 58s |
8. Attacks Against WEP- 6m 19s |
9. VPNs Part1- 3m 26s |
10. VPNs Part2- 6m 19s |
11. VPN Tunneling Protocols- 1m 49s |
12. MAC Filters- 2m 36s |
13. SSID Segmentation- 4m 26s |
14. SSID Cloaking- 1m 58s |
15. Demo - Security Associations- 9m 39s |
16. Demo - Security Associations Part A- 4m 39s |
17. Demo - Security Associations Part B- 5m |
18. Demo - MAC Spoofing- 6m 49s |
19. Module 02 Review- 40s |
Lectures |
---|
1. Encryption Ciphers and Methods- 37s |
2. Encryption Basics- 8m 18s |
3. Stream and Block Ciphers- 6m |
4. WLAN Encryption Methods- 3m 8s |
5. WEP Again- 1m 2s |
6. TKIP Part1- 6m 54s |
7. TKIP Part2- 7m 31s |
8. MIC- 6m 59s |
9. TKIP MPDU- 5m 2s |
10. CCMP Part1- 3m 49s |
11. CCMP Part2- 4m 7s |
12. CCMP Part3- 3m 23s |
13. CCMP Part4- 2m 24s |
14. CCMP Part5- 3m 45s |
15. WPA/WPA2- 1m 15s |
16. Proprietary Solutions- 51s |
17. Demo - Encryption Example- 6m 27s |
18. Module 03 Review- 23s |
Lectures |
---|
1. 802.11 Authentication Methods- 43s |
2. WLAN Authentication Overview- 8m |
3. AAA- 2m 36s |
4. Authentication- 7m 11s |
5. Authorization- 3m 20s |
6. Accounting- 4m 45s |
7. 802.1X- 5m 4s |
8. Supplicant Credentials- 7m 26s |
9. Authentication Server Credentials- 8m 2s |
10. EAP- 4m 23s |
11. EAP Process- 5m 50s |
12. Legacy EAP- 3m 54s |
13. Strong EAP Protocols- 4m 48s |
14. PACs- 4m 46s |
15. Demo - Certificate Authority Server Credentials- 5m 51s |
16. Module 04 Review- 41s |
Lectures |
---|
1. Dynamic Encryption Key Generation- 1m 7s |
2. Dynamic WEP- 5m 59s |
3. RSN- 6m 44s |
4. Management Frames & RSNIE (eNotes)- 6m 30s |
5. RSN (Cont.)- 1m 11s |
6. Authentication and Key Management (AKM) Part1- 4m 22s |
7. Authentication and Key Management (AKM) Part2- 5m 14s |
8. Authentication and Key Management (AKM) Part3- 43s |
9. Authentication and Key Management (AKM) Part4- 2m 41s |
10. RSNA Key Hierarchy- 2m 23s |
11. Master Session Key (MSK)- 2m 23s |
12. 4-Way Handshake- 3m 17s |
13. Steps of the 4 -way Handshake- 51s |
14. Group Key Handshake- 1m 7s |
15. PeerKey Handshake- 2m |
16. Demo - EAP- 5m 35s |
17. Demo - Information Elements- 6m 39s |
18. Module 05 Review- 57s |
Lectures |
---|
1. SOHO 802.11 Security- 25s |
2. Introduction- 4m 48s |
3. Why a Passphrase- 7m 32s |
4. 4-Way Handshake Again- 5m 54s |
5. Risks of WPA/WPA2- 4m 49s |
6. Another Risk Factor of WPA/2- 3m 4s |
7. Wi -Fi Protected Setup (WPS) Part1- 2m 32s |
8. Wi -Fi Protected Setup (WPS) Part2- 4m 25s |
9. Wi -Fi Protected Setup (WPS) Part3- 26s |
10. Wi -Fi Protected Setup (WPS) Part4- 3m 34s |
11. Wi -Fi Protected Setup (WPS) Part5- 1m 2s |
12. Initial WLAN Setup- 1m 40s |
13. SOHO Best Practices- 5m 56s |
14. Demo - Cracking Hashes- 9m 37s |
15. Module 06 Review- 39s |
Lectures |
---|
1. Fast Secure Roaming- 1m 7s |
2. History of 802.11 Roaming- 4m 11s |
3. Client Roaming Thresholds- 3m 2s |
4. AP to AP Handoff (e -notes- 9m 10s |
5. Re -Association- 2m 1s |
6. Types of APs- 3m 9s |
7. RSNA Review- 1m 46s |
8. PMKSA- 7m 47s |
9. PMK Caching- 1m 58s |
10. Pre -authentication- 3m 29s |
11. Opportunistic Key Caching (OKC)- 10m 1s |
12. Proprietary FSR- 6m 3s |
13. FT Key Hierarchy (e -notes)- 9m 8s |
14. FT Initial Mobility Domain Association- 2m 17s |
15. Over the Air Fast BSS Transition (e -notes)- 6m 7s |
16. Over the Air DS Fast BSS Transition (e - notes)- 12m 25s |
17. 802.11K -2008- 3m 51s |
18. L3 Roaming- 10m 43s |
19. Mobile IP- 4m 46s |
20. Troubleshooting- 3m 35s |
21. Voice Personal and Voice Enterprise- 4m 51s |
Lectures |
---|
1. Wireless Security Risks- 42s |
2. Introduction- 26s |
3. Rogue Devices Part1- 9m 12s |
4. Rogue Devices Part2- 3m 43s |
5. Rogue Prevention- 3m 13s |
6. Eavesdropping- 4m 41s |
7. Authentication Attacks- 1m 16s |
8. DoS- 1m 11s |
9. L2 DoS- 1m 11s |
10. 802.11w- 53s |
11. MAC Spoofing- 1m 48s |
12. Wireless Hijacking- 2m 43s |
13. Peer -to -Peer Attacks- 1m 49s |
14. Management Interface Exploits- 2m 42s |
15. Physical Damage and Theft- 40s |
16. Social Engineering- 46s |
17. Public Access and WLAN Hotspots- 38s |
18. Demo - Rogue Devices- 4m 26s |
19. Demo - Public Hotspots- 6m 32s |
20. Module 08 Review- 30s |
Lectures |
---|
1. Wireless LAN Security Auditing- 19s |
2. Purpose of Auditing- 1m 27s |
3. WLAN Audits Part1- 1m 52s |
4. WLAN Audits Part2- 46s |
5. Layer 1 Audit- 5m 13s |
6. Layer 2 Audit- 2m 13s |
7. Penetration Testing- 3m 57s |
8. Wired Infrastructure Audit- 3m 7s |
9. Social Engineering- 1m 47s |
10. WIPS Audit- 52s |
11. Documenting the Audit- 4m 10s |
12. Recommendations- 43s |
13. WLAN Security Auditing Tools- 1m 32s |
14. Module 09 Review- 23s |
Lectures |
---|
1. Wireless Security Monitoring- 45s |
2. WIDS/WIPS- 1m 2s |
3. WIDS/WIPS continue- 6m 23s |
4. Sensor Placement- 3m 57s |
5. Example of Rogue Detection (e -notes)- 8m 57s |
6. Device Tracking- 6m 53s |
7. Signature Analysis- 1m 4s |
8. Behavioral Analysis- 2m 22s |
9. Other Types of Monitoring- 5m 57s |
10. More on Monitoring- 52s |
11. Module 10 Review- 24s |
Lectures |
---|
1. VPNs, Remote Access and Guest Access Services- 34s |
2. VPN Review Part1- 11m 18s |
3. VPN Review Part2- 11m |
4. Remote Access Part1- 6m 20s |
5. Remote Access Part2- 7m 22s |
6. Module 11 Review- 22s |
Lectures |
---|
1. WLAN Security Infrastructure- 39s |
2. WLAN Architecture- 7m 35s |
3. Lightweight or Controller Based APs (e-notes)- 8m 16s |
4. Other Controller Based Definitions- 14m 8s |
5. Device Management- 6m 58s |
6. Management Protocols- 6m 49s |
7. Controller Communications- 5m 26s |
8. Authorization Servers- 3m 13s |
9. Deployment Architectures- 7m 40s |
10. Other RADIUS Solutions- 4m 48s |
11. RBAC- 4m 18s |
12. Other Security Systems- 6m 18s |
13. Module 12 Review- 23s |
Lectures |
---|
1. Wireless Security Policies- 21s |
2. General Policy Part1- 2m 13s |
3. General Policy Part2- 4m 15s |
4. Policy Creation- 3m 13s |
5. Policy Management- 2m 26s |
6. Functional Policy- 2m 52s |
7. Password Policy- 1m 40s |
8. Other Policies Part1- 3m 33s |
9. Other Policies Part2- 2m 18s |
10. Government and Industry Regulations- 6m 20s |
11. Module 13 Review- 25s |
12. Course Closure- 1m 47s |
PassQueen does not provide real Microsoft exam questions. Similarly, PassQueen does not supply real Amazon exam questions. The materials offered by PassQueen lack real questions and answers of certification exams. The CFA Institute neither endorses nor assures the accuracy or quality of PassQueen content. CFA® and Chartered Financial Analyst® are registered trademarks held by the CFA Institute.
Other Pages
© 2025 All Rights Reserved passqueen.com.