Skip to content
RobinWifi

RobinWifi

RobinWifi
RobinWifi

  • Home
  • About Me
CWNP CWSP

CWSP-207 Chapter 1: Security Fundamentals

Robin Decloedt January 29, 2025 No Comments

Security in Wi-Fi networking goes beyond just passwords—it's about protecting data, ensuring secure authentication, and…

Read More
CWAP CWNP

Conquering CWAP-404: A Personal Study and Exam Experience

Robin Decloedt January 3, 2025 1 Comment

Preparing for the CWAP-404 certification was a challenging yet rewarding journey. From understanding complex MAC…

Read More
CWAP CWNP

CWAP-404 Chapter 8: HT, VHT and HE Operations

Robin Decloedt December 26, 2024 No Comments

Chapter 8 of CWAP-404 explores MIMO and its pivotal role in modern wireless communication. Dive…

Read More
CWAP CWNP

CWAP-404 Chapter 7: MAC Operations

Robin Decloedt December 16, 2024 No Comments

This chapter explores how 802.11 MAC Operations work in relation to Data Frame Exchanges. While…

Read More
CWAP CWNP

CWAP-404 Chapter 6: Medium Access methods and QoS Frame exchanges

Robin Decloedt November 30, 2024 No Comments

Understanding how devices access and contend for the wireless medium is crucial to optimizing Wi-Fi…

Read More
CWAP CWNP

CWAP-404 Chapter 5: BSS Association, Transition and Security Exchanges

Robin Decloedt November 21, 2024 1 Comment

Now that we’ve both covered the different layer 1 and layer 2 frame formats, let’s…

Read More
CWAP CWNP

CWAP-404 Chapter 4: 802.11 MAC Frames

Robin Decloedt November 9, 2024 No Comments

In this chapter, we dive into Layer 2 of Wi-Fi: the MAC layer. Covering the…

Read More
CWAP CWNP

CWAP-404 Chapter 3: The Physical (PHY) Layer

Robin Decloedt October 14, 2024 No Comments

In this chapter of CWAP 404, we delve into the critical aspects of the 802.11…

Read More
CWAP CWNP

CWAP-404 Chapter 2: Protocol Analysis

Robin Decloedt September 27, 2024 1 Comment

Chapter 2 of the CWAP-404 study guide dives into wireless traffic capturing techniques, exploring when…

Read More
CWAP CWNP

CWAP-404 Chapter 1: 802.11 – The Protocol

Robin Decloedt September 22, 2024 1 Comment

Before getting into the advanced analysis of wireless networks, Chapter 1 serves as a refresher…

Read More

Posts pagination

1 2 3

« Previous Page — Next Page »

Recent Posts

  • How I Took On CWSP – One Chapter at a Time
  • CWSP-207 Chapter 10: WPA3 and OWE
  • CWSP-207 Chapter 9: Network Monitoring
  • CWSP-207 Chapter 8: Secure Roaming
  • CWSP-207 Chapter 7: Security Design Scenarios

Recent Comments

  1. Tristan Ziemann on CWSP-207 Chapter 3: Security Policy
  2. Tristan Ziemann on Conquering CWAP-404: A Personal Study and Exam Experience
  3. Tristan Ziemann on CWAP-404 Chapter 5: BSS Association, Transition and Security Exchanges
  4. Tristan Ziemann on Welcome to RobinWifi: The Start of a Wireless Journey!
  5. Philippe on CWAP-404 Chapter 2: Protocol Analysis

Categories

  • CWAP
  • CWNP
  • CWSP
  • Introduction

You Missed

CWNP CWSP

How I Took On CWSP – One Chapter at a Time

CWNP CWSP

CWSP-207 Chapter 10: WPA3 and OWE

CWNP CWSP

CWSP-207 Chapter 9: Network Monitoring

CWNP CWSP

CWSP-207 Chapter 8: Secure Roaming

RobinWifi

RobinWifi

Copyright ©2024 All rights reserved | Blogus by Themeansar.

  • Privacy Policy
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}