O'Reilly logo

CWSP® Certified Wireless Security Professional Official: Study Guide by Shawn M. Jackman, Bryan E. Harkins, David A. Westcott, David D. Coleman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Wireless Security Monitoring

IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:

  • Wireless intrusion detection and prevention systems (WIDS and WIPS)

    • WIDS/WIPS infrastructure components

    • WIDS/WIPS architecture models

    • Multiple radio sensors

    • Sensor placement

  • Device classification

    • Rogue detection

    • Rogue mitigation

    • Device tracking

  • WIDS/WIPS analysis

    • Signature analysis

    • Behavioral analysis

    • Protocol analysis

    • Spectrum analysis

    • Forensic analysis

    • Performance analysis

  • Monitoring

    • Policy enforcement

    • Alarms and notification

    • False positives

    • Reports

  • 802.11n

  • Proprietary WIPS

    • Cloaking

    • Management frame protection

  • 802.11w

Wireless Security Monitoring

Wireless Intrusion Detection and Prevention Systems (WIDS and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required