Book description
Sybex is now the official publisher for Certified Wireless Network Professional, the certifying vendor for the CWSP program. This guide covers all exam objectives, including WLAN discovery techniques, intrusion and attack techniques, 802.11 protocol analysis. Wireless intrusion-prevention systems implementation, layer 2 and 3 VPNs used over 802.11 networks, and managed endpoint security systems. It also covers enterprise/SMB/SOHO/Public-Network Security design models and security solution implementation, building robust security networks, wireless LAN management systems, and much more.
Table of contents
- Copyright
- Dear Reader,
- Acknowledgments
- About the Authors
- Foreword
- Introduction
- Assessment Test
- 1. WLAN Security Overview
- 2. Legacy 802.11 Security
- 3. Encryption Ciphers and Methods
-
4. Enterprise 802.11 Layer 2 Authentication Methods
- 4.1. WLAN Authentication Overview
- 4.2. AAA
- 4.3. 802.1X
- 4.4. Supplicant Credentials
- 4.5. Authentication Server Credentials
- 4.6. Shared Secret
- 4.7. Legacy Authentication Protocols
- 4.8. EAP
- 4.9. Summary
- 4.10. Exam Essentials
- 4.11. Key Terms
- 4.12. Review Questions
- 4.13. Answers to Review Questions
-
5. 802.11 Layer 2 Dynamic Encryption Key Generation
- 5.1. Advantages of Dynamic Encryption
-
5.2. Robust Security Network (RSN)
- 5.2.1. RSN Information Element
- 5.2.2. Authentication and Key Management (AKM)
- 5.2.3. RSNA Key Hierarchy
- 5.2.4. Master Session Key (MSK)
- 5.2.5. Master Keys
- 5.2.6. Temporal Keys
- 5.2.7. 4-Way Handshake
- 5.2.8. Group Key Handshake
- 5.2.9. PeerKey Handshake
- 5.2.10. RSNA Security Associations
- 5.2.11. Passphrase-to-PSK Mapping
- 5.2.12. Roaming and Dynamic Keys
- 5.3. Summary
- 5.4. Exam Essentials
- 5.5. Key Terms
- 5.6. Review Questions
- 5.7. Answers to Review Questions
-
6. SOHO 802.11 Security
- 6.1. WPA/WPA2-Personal
- 6.2. Wi-Fi Protected Setup (WPS)
- 6.3. SOHO Security Best Practices
- 6.4. Summary
- 6.5. Exam Essentials
- 6.6. Key Terms
- 6.7. Review Questions
- 6.8. Answers to Review Questions
-
7. 802.11 Fast Secure Roaming
- 7.1. History of 802.11 Roaming
- 7.2. RSNA
- 7.3. Opportunistic Key Caching (OKC)
- 7.4. Proprietary FSR
- 7.5. Fast BSS Transition (FT)
- 7.6. 802.11k
- 7.7. Voice Personal and Voice Enterprise
- 7.8. Layer 3 Roaming
- 7.9. Troubleshooting
- 7.10. SCA Roaming
- 7.11. Exam Essentials
- 7.12. Key Terms
- 7.13. Review Questions
- 7.14. Answers to Review Questions
- 8. Wireless Security Risks
- 9. Wireless LAN Security Auditing
-
10. Wireless Security Monitoring
- 10.1. Wireless Intrusion Detection and Prevention Systems (WIDS and WIPS)
- 10.2. Device Classification
- 10.3. WIDS/WIPS Analysis
- 10.4. Monitoring
- 10.5. 802.11n
- 10.6. Proprietary WIPS
- 10.7. 802.11w
- 10.8. Summary
- 10.9. Exam Essentials
- 10.10. Key Terms
- 10.11. Review Questions
- 10.12. Answers to Review Questions
- 11. VPNs, Remote Access, and Guest Access Services
-
12. WLAN Security Infrastructure
- 12.1. WLAN Architecture Capabilities Overview
- 12.2. Device Management
- 12.3. RADIUS/LDAP Servers
- 12.4. Public Key Infrastructure (PKI)
- 12.5. Role-Based Access Control
- 12.6. Enterprise Encryption Gateways
- 12.7. Summary
- 12.8. Exam Essentials
- 12.9. Key Terms
- 12.10. Review Questions
- 12.11. Answers to Review Questions
-
13. Wireless Security Policies
- 13.1. General Policy
- 13.2. Functional Policy
-
13.3. Government and Industry Regulations
- 13.3.1. The US Department of Defense (DoD) Directive 8100.2
- 13.3.2. Federal Information Processing Standards (FIPS) 140-2
- 13.3.3. The Sarbanes-Oxley Act of 2002 (SOX)
- 13.3.4. Health Insurance Portability and Accountability Act (HIPAA)
- 13.3.5. Payment Card Industry (PCI) Standard
- 13.3.6. Compliance Reports
- 13.4. 802.11 WLAN Policy Recommendations
- 13.5. Summary
- 13.6. Exam Essentials
- 13.7. Key Terms
- 13.8. Review Questions
- 13.9. Answers to Review Questions
-
A. Abbreviations, Acronyms, and Regulations
- A.1.
-
A.2. Power Regulations
- A.2.1. 2.4 GHz ISM Point-to-Multipoint (PtMP) Communications
- A.2.2. 5 GHz UNII Point-to-Multipoint (PtMP) Communications
- A.2.3. 2.4 GHz ISM Point-to-Point (PtP) Communications
- A.2.4. 5 GHz UNII Point-to-Point (PtP) Communications
- A.2.5. Windows Registry Values that Control Preauthentication and PMK Caching
- B. WLAN Vendors
- C. About the Companion CD
- Glossary
Product information
- Title: CWSP® Certified Wireless Security Professional Official: Study Guide
- Author(s):
- Release date: February 2010
- Publisher(s): Sybex
- ISBN: 9780470438916
You might also like
book
CWSP, 2nd Edition
The most detailed, comprehensive coverage of CWSP-205 exam objectives CWSP: Certified Wireless Security Professional Study Guide …
book
CWNA Certified Wireless Network Administrator Study Guide, 5th Edition
The bestselling CWNA study guide, updated for the latest exam The CWNA: Certified Wireless Network Administrator …
book
CWAP® Certified Wireless Analysis Professional: Official Study Guide
The official study guide for the Certified Wireless Analysis Professional certification from CWNP Four leading wireless …
book
Cisco Software-Defined Access
The definitive Cisco SD-Access resource, from the architects who train Ciscos own engineers and partners This …