O'Reilly logo

CWSP® Certified Wireless Security Professional Official: Study Guide by Shawn M. Jackman, Bryan E. Harkins, David A. Westcott, David D. Coleman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. SOHO 802.11 Security

IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:

  • WPA/WPA2-Personal

    • Preshared keys (PSK) and passphrases

    • WPA/WPA2-Personal risks

    • Entropy

    • Proprietary PSK

  • Wi-Fi Protected Setup (WPS)

    • WPS architecture

  • SOHO security best practices

SOHO 802.11 Security

Chances are, if you bought this book and strive to be a Certified Wireless Security Professional, you are probably—at best—moderately interested in reading a chapter on SOHO security. It is nonetheless important to understand the differences between the SOHO solutions that are in use today. This information can be used to help provide consultation to network operators on the strengths and weaknesses ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required