CWSP-206: CWSP Certified Wireless Security Professional

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.

What’s included

  • 212 : Lectures
  • 13h 12m 6s : Duration
video-file-formats

$14.99/24.99


Lectures
1. Introduction- 1m 35s
2. Instructor Introduction- 1m 42s

Lectures
1. WLAN Security Overview- 1m 40s
2. Where We Came From- 2m 26s
3. Standards Organizations- 1m 31s
4. ISO and the OSI- 10m 25s
5. ISOC Hierarchy- 3m
6. Wi-Fi Alliance Standards- 7m 2s
7. 802.11 Networking Basics Part1- 1m 28s
8. 802.11 Networking Basics Part2- 2m 43s
9. Connection Types- 2m 8s
10. 802.11 Security Basics- 1m 54s
11. Data Privacy Part1- 1m 48s
12. Data Privacy Part2- 3m 14s
13. AAA- 1m 33s
14. Segmentation- 3m 46s
15. Monitoring- 1m 42s
16. Policy- 1m 19s
17. Security History- 51s
18. 802.11i and WPA Part1- 45s
19. 802.11i and WPA Part2- 1m 37s
20. 802.11i and WPA Part3- 2m 35s
21. RSN (Robust Security Network)- 54s
22. Future of 802.11 Security Part1- 1m 44s
23. Future of 802.11 Security Part2- 1m 30s
24. Demo - Networking Basics- 4m 45s
25. Demo - Web GUI Introduction- 5m 13s
26. Demo - Security Options- 3m 13s
27. Module 01 Review- 49s

Lectures
1. Legacy Security- 48s
2. Authentication- 1m
3. Open System Authentication- 2m 31s
4. WEP Encryption- 4m 9s
5. Shared Key Authentication- 2m 26s
6. More About WEP Part1- 6m 5s
7. More About WEP Part2- 8m 58s
8. Attacks Against WEP- 6m 19s
9. VPNs Part1- 3m 26s
10. VPNs Part2- 6m 19s
11. VPN Tunneling Protocols- 1m 49s
12. MAC Filters- 2m 36s
13. SSID Segmentation- 4m 26s
14. SSID Cloaking- 1m 58s
15. Demo - Security Associations- 9m 39s
16. Demo - Security Associations Part A- 4m 39s
17. Demo - Security Associations Part B- 5m
18. Demo - MAC Spoofing- 6m 49s
19. Module 02 Review- 40s

Lectures
1. Encryption Ciphers and Methods- 37s
2. Encryption Basics- 8m 18s
3. Stream and Block Ciphers- 6m
4. WLAN Encryption Methods- 3m 8s
5. WEP Again- 1m 2s
6. TKIP Part1- 6m 54s
7. TKIP Part2- 7m 31s
8. MIC- 6m 59s
9. TKIP MPDU- 5m 2s
10. CCMP Part1- 3m 49s
11. CCMP Part2- 4m 7s
12. CCMP Part3- 3m 23s
13. CCMP Part4- 2m 24s
14. CCMP Part5- 3m 45s
15. WPA/WPA2- 1m 15s
16. Proprietary Solutions- 51s
17. Demo - Encryption Example- 6m 27s
18. Module 03 Review- 23s

Lectures
1. 802.11 Authentication Methods- 43s
2. WLAN Authentication Overview- 8m
3. AAA- 2m 36s
4. Authentication- 7m 11s
5. Authorization- 3m 20s
6. Accounting- 4m 45s
7. 802.1X- 5m 4s
8. Supplicant Credentials- 7m 26s
9. Authentication Server Credentials- 8m 2s
10. EAP- 4m 23s
11. EAP Process- 5m 50s
12. Legacy EAP- 3m 54s
13. Strong EAP Protocols- 4m 48s
14. PACs- 4m 46s
15. Demo - Certificate Authority Server Credentials- 5m 51s
16. Module 04 Review- 41s

Lectures
1. Dynamic Encryption Key Generation- 1m 7s
2. Dynamic WEP- 5m 59s
3. RSN- 6m 44s
4. Management Frames & RSNIE (eNotes)- 6m 30s
5. RSN (Cont.)- 1m 11s
6. Authentication and Key Management (AKM) Part1- 4m 22s
7. Authentication and Key Management (AKM) Part2- 5m 14s
8. Authentication and Key Management (AKM) Part3- 43s
9. Authentication and Key Management (AKM) Part4- 2m 41s
10. RSNA Key Hierarchy- 2m 23s
11. Master Session Key (MSK)- 2m 23s
12. 4-Way Handshake- 3m 17s
13. Steps of the 4 -way Handshake- 51s
14. Group Key Handshake- 1m 7s
15. PeerKey Handshake- 2m
16. Demo - EAP- 5m 35s
17. Demo - Information Elements- 6m 39s
18. Module 05 Review- 57s

Lectures
1. SOHO 802.11 Security- 25s
2. Introduction- 4m 48s
3. Why a Passphrase- 7m 32s
4. 4-Way Handshake Again- 5m 54s
5. Risks of WPA/WPA2- 4m 49s
6. Another Risk Factor of WPA/2- 3m 4s
7. Wi -Fi Protected Setup (WPS) Part1- 2m 32s
8. Wi -Fi Protected Setup (WPS) Part2- 4m 25s
9. Wi -Fi Protected Setup (WPS) Part3- 26s
10. Wi -Fi Protected Setup (WPS) Part4- 3m 34s
11. Wi -Fi Protected Setup (WPS) Part5- 1m 2s
12. Initial WLAN Setup- 1m 40s
13. SOHO Best Practices- 5m 56s
14. Demo - Cracking Hashes- 9m 37s
15. Module 06 Review- 39s

Lectures
1. Fast Secure Roaming- 1m 7s
2. History of 802.11 Roaming- 4m 11s
3. Client Roaming Thresholds- 3m 2s
4. AP to AP Handoff (e -notes- 9m 10s
5. Re -Association- 2m 1s
6. Types of APs- 3m 9s
7. RSNA Review- 1m 46s
8. PMKSA- 7m 47s
9. PMK Caching- 1m 58s
10. Pre -authentication- 3m 29s
11. Opportunistic Key Caching (OKC)- 10m 1s
12. Proprietary FSR- 6m 3s
13. FT Key Hierarchy (e -notes)- 9m 8s
14. FT Initial Mobility Domain Association- 2m 17s
15. Over the Air Fast BSS Transition (e -notes)- 6m 7s
16. Over the Air DS Fast BSS Transition (e - notes)- 12m 25s
17. 802.11K -2008- 3m 51s
18. L3 Roaming- 10m 43s
19. Mobile IP- 4m 46s
20. Troubleshooting- 3m 35s
21. Voice Personal and Voice Enterprise- 4m 51s

Lectures
1. Wireless Security Risks- 42s
2. Introduction- 26s
3. Rogue Devices Part1- 9m 12s
4. Rogue Devices Part2- 3m 43s
5. Rogue Prevention- 3m 13s
6. Eavesdropping- 4m 41s
7. Authentication Attacks- 1m 16s
8. DoS- 1m 11s
9. L2 DoS- 1m 11s
10. 802.11w- 53s
11. MAC Spoofing- 1m 48s
12. Wireless Hijacking- 2m 43s
13. Peer -to -Peer Attacks- 1m 49s
14. Management Interface Exploits- 2m 42s
15. Physical Damage and Theft- 40s
16. Social Engineering- 46s
17. Public Access and WLAN Hotspots- 38s
18. Demo - Rogue Devices- 4m 26s
19. Demo - Public Hotspots- 6m 32s
20. Module 08 Review- 30s

Lectures
1. Wireless LAN Security Auditing- 19s
2. Purpose of Auditing- 1m 27s
3. WLAN Audits Part1- 1m 52s
4. WLAN Audits Part2- 46s
5. Layer 1 Audit- 5m 13s
6. Layer 2 Audit- 2m 13s
7. Penetration Testing- 3m 57s
8. Wired Infrastructure Audit- 3m 7s
9. Social Engineering- 1m 47s
10. WIPS Audit- 52s
11. Documenting the Audit- 4m 10s
12. Recommendations- 43s
13. WLAN Security Auditing Tools- 1m 32s
14. Module 09 Review- 23s

Lectures
1. Wireless Security Monitoring- 45s
2. WIDS/WIPS- 1m 2s
3. WIDS/WIPS continue- 6m 23s
4. Sensor Placement- 3m 57s
5. Example of Rogue Detection (e -notes)- 8m 57s
6. Device Tracking- 6m 53s
7. Signature Analysis- 1m 4s
8. Behavioral Analysis- 2m 22s
9. Other Types of Monitoring- 5m 57s
10. More on Monitoring- 52s
11. Module 10 Review- 24s

Lectures
1. VPNs, Remote Access and Guest Access Services- 34s
2. VPN Review Part1- 11m 18s
3. VPN Review Part2- 11m
4. Remote Access Part1- 6m 20s
5. Remote Access Part2- 7m 22s
6. Module 11 Review- 22s

Lectures
1. WLAN Security Infrastructure- 39s
2. WLAN Architecture- 7m 35s
3. Lightweight or Controller Based APs (e-notes)- 8m 16s
4. Other Controller Based Definitions- 14m 8s
5. Device Management- 6m 58s
6. Management Protocols- 6m 49s
7. Controller Communications- 5m 26s
8. Authorization Servers- 3m 13s
9. Deployment Architectures- 7m 40s
10. Other RADIUS Solutions- 4m 48s
11. RBAC- 4m 18s
12. Other Security Systems- 6m 18s
13. Module 12 Review- 23s

Lectures
1. Wireless Security Policies- 21s
2. General Policy Part1- 2m 13s
3. General Policy Part2- 4m 15s
4. Policy Creation- 3m 13s
5. Policy Management- 2m 26s
6. Functional Policy- 2m 52s
7. Password Policy- 1m 40s
8. Other Policies Part1- 3m 33s
9. Other Policies Part2- 2m 18s
10. Government and Industry Regulations- 6m 20s
11. Module 13 Review- 25s
12. Course Closure- 1m 47s

PassQueen does not provide real Microsoft exam questions. Similarly, PassQueen does not supply real Amazon exam questions. The materials offered by PassQueen lack real questions and answers of certification exams. The CFA Institute neither endorses nor assures the accuracy or quality of PassQueen content. CFA® and Chartered Financial Analyst® are registered trademarks held by the CFA Institute.

Helpful Pages

© 2025 All Rights Reserved passqueen.com.