CWSP, 2nd Edition

Book description

The most detailed, comprehensive coverage of CWSP-205 exam objectives

CWSP: Certified Wireless Security Professional Study Guide offers comprehensive preparation for the CWSP-205 exam. Fully updated to align with the new 2015 exam, this guide covers all exam objectives and gives you access to the Sybex interactive online learning system so you can go into the test fully confident in your skills. Coverage includes WLAN discovery, intrusion and attack, 802.11 protocol analysis, wireless intrusion prevention system implementation, Layer 2 and 3 VPN over 802.11 networks, managed endpoint security systems, and more. Content new to this edition features discussions about BYOD and guest access, as well as detailed and insightful guidance on troubleshooting. With more than double the coverage of the “official” exam guide, plus access to interactive learning tools, this book is your ultimate solution for CWSP-205 exam prep.

The CWSP is the leading vendor-neutral security certification administered for IT professionals, developed for those working with and securing wireless networks. As an advanced certification, the CWSP requires rigorous preparation — and this book provides more coverage and expert insight than any other source.

  • Learn the ins and outs of advanced network security
  • Study 100 percent of CWSP-205 objectives
  • Test your understanding with two complete practice exams
  • Gauge your level of preparedness with a pre-test assessment

The CWSP is a springboard for more advanced certifications, and the premier qualification employers look for in the field. If you’ve already earned the CWTS and the CWNA, it’s time to take your career to the next level. CWSP: Certified Wireless Security Professional Study Guide is your ideal companion for effective, efficient CWSP-205 preparation.

Table of contents

  1. Cover Page
  2. Title Page
  3. Copyright Page
  4. Acknowledgments
  5. About the Authors
  6. Contents at a Glance
  7. Contents
  8. Table of Exercises
  9. Foreword
  10. Introduction
  11. Assessment Test
  12. Chapter 1: WLAN Security Overview
    1. Standards Organizations
      1. International Organization for Standardization (ISO)
      2. Institute of Electrical and Electronics Engineers (IEEE)
      3. Internet Engineering Task Force (IETF)
      4. Wi-Fi Alliance
    2. 802.11 Networking Basics
    3. 802.11 Security Basics
      1. Data Privacy
      2. Authentication, Authorization, Accounting (AAA)
      3. Segmentation
      4. Monitoring
      5. Policy
    4. 802.11 Security History
      1. 802.11i Security Amendment and WPA Certifications
      2. Robust Security Network (RSN)
    5. Summary
    6. Exam Essentials
    7. Review Questions
  13. Chapter 2: Legacy 802.11 Security
    1. Authentication
      1. Open System Authentication
      2. Shared Key Authentication
    2. Wired Equivalent Privacy (WEP) Encryption
    3. TKIP
    4. Virtual Private Networks (VPNs)
      1. Point-to-Point Tunneling Protocol (PPTP)
      2. Layer 2 Tunneling Protocol (L2TP)
      3. Internet Protocol Security (IPsec)
      4. Secure Sockets Layer (SSL)
      5. VPN Configuration Complexity
      6. VPN Scalability
    5. MAC Filters
    6. SSID Segmentation
    7. SSID Cloaking
    8. Summary
    9. Exam Essentials
    10. Review Questions
  14. Chapter 3: Encryption Ciphers and Methods
    1. Encryption Basics
      1. Symmetric and Asymmetric Algorithms
      2. Stream and Block Ciphers
      3. RC4/ARC4
      4. RC5
      5. DES
      6. 3DES
    2. AES
    3. WLAN Encryption Methods
    4. WEP
      1. WEP MPDU
    5. TKIP
      1. TKIP MPDU
    6. CCMP
      1. CCMP MPDU
    7. WPA/WPA2
    8. Future Encryption Methods
    9. Proprietary Layer 2 Implementations
    10. Summary
    11. Exam Essentials
    12. Review Questions
  15. Chapter 4: 802.1X/EAP Authentication
    1. WLAN Authentication Overview
    2. AAA
      1. Authentication
      2. Authorization
      3. Accounting
    3. 802.1X
      1. Supplicant
      2. Authenticator
      3. Authentication Server
    4. Supplicant Credentials
      1. Usernames and Passwords
      2. Digital Certificates
      3. Protected Access Credentials (PACs)
      4. One-Time Passwords
      5. Smart Cards and USB Tokens
      6. Machine Authentication
    5. 802.1X/EAP and Certificates
      1. Server Certificates and Root CA Certificates
      2. Client Certificates
    6. Shared Secret
    7. Legacy Authentication Protocols
      1. PAP
      2. CHAP
      3. MS-CHAP
      4. MS-CHAPv2
    8. EAP
      1. Weak EAP Protocols
      2. EAP-MD5
      3. EAP-LEAP
      4. Strong EAP Protocols
      5. EAP-PEAP
      6. EAP-TTLS
      7. EAP-TLS
      8. EAP-FAST
      9. Miscellaneous EAP Protocols
      10. EAP-SIM
      11. EAP-AKA
      12. EAP-TEAP
    9. Summary
    10. Exam Essentials
    11. Review Questions
  16. Chapter 5: 802.11 Layer 2 Dynamic Encryption Key Generation
    1. Advantages of Dynamic Encryption
    2. Robust Security Network (RSN)
      1. RSN Information Element
      2. Authentication and Key Management (AKM)
      3. RSNA Key Hierarchy
      4. 4-Way Handshake
      5. Group Key Handshake
      6. PeerKey Handshake
      7. TDLS Peer Key Handshake
      8. RSNA Security Associations
      9. Passphrase-to-PSK Mapping
      10. Roaming and Dynamic Keys
    3. Summary
    4. Exam Essentials
    5. Review Questions
  17. Chapter 6: PSK Authentication
    1. WPA/WPA2-Personal
      1. Preshared Keys (PSK) and Passphrases
      2. WPA/WPA2-Personal Risks
      3. Entropy
      4. Proprietary PSK
      5. Simultaneous Authentication of Equals (SAE)
    2. Summary
    3. Exam Essentials
    4. Review Questions
  18. Chapter 7: 802.11 Fast Secure Roaming
    1. History of 802.11 Roaming
      1. Client Roaming Thresholds
      2. AP-to-AP Handoff
    2. RSNA
      1. PMKSA
      2. PMK Caching
      3. Preauthentication
    3. Opportunistic Key Caching (OKC)
    4. Proprietary FSR
    5. Fast BSS Transition (FT)
      1. Information Elements
      2. FT Initial Mobility Domain Association
      3. Over-the-Air Fast BSS Transition
      4. Over-the-DS Fast BSS Transition
    6. 802.11k
    7. 802.11v
    8. Voice Enterprise
    9. Layer 3 Roaming
    10. Troubleshooting
    11. Summary
    12. Exam Essentials
    13. Review Questions
  19. Chapter 8: WLAN Security Infrastructure
    1. 802.11 Services
      1. Integration Service (IS)
      2. Distribution System (DS)
    2. Management, Control, and Data Planes
      1. Management Plane
      2. Control Plane
      3. Data Plane
    3. WLAN Architecture
      1. Autonomous WLAN Architecture
      2. Centralized Network Management Systems
      3. Cloud Networking
      4. Centralized WLAN Architecture
      5. Distributed WLAN Architecture
      6. Unified WLAN Architecture
      7. Hybrid Architectures
      8. Enterprise WLAN Routers
      9. WLAN Mesh Access Points
      10. WLAN Bridging
    4. VPN Wireless Security
      1. VPN 101
      2. Layer 3 VPNs
      3. SSL VPN
      4. VPN Deployment
    5. Infrastructure Management
      1. Protocols for Management
    6. Summary
    7. Exam Essentials
    8. Review Questions
  20. Chapter 9: RADIUS and LDAP
    1. LDAP
    2. RADIUS
      1. Authentication and Authorization
      2. Accounting
      3. RADIUS Configuration
      4. LDAP Proxy
      5. RADIUS Deployment Models
      6. RADIUS Proxy
      7. RADIUS Proxy and Realms
      8. RADIUS Failover
      9. WLAN Devices as RADIUS Servers
      10. Captive Web Portal and MAC Authentication
      11. RadSec
    3. Attribute-Value Pairs
      1. Vendor-Specific Attributes
      2. VLAN Assignment
      3. Role-Based Access Control
      4. LDAP Attributes
    4. Summary
    5. Exam Essentials
    6. Review Questions
  21. Chapter 10: Bring Your Own Device (BYOD) and Guest Access
    1. Mobile Device Management
      1. Company-Issued Devices vs. Personal Devices
      2. MDM Architecture
      3. MDM Enrollment
      4. MDM Profiles
      5. MDM Agent Software
      6. Over-the-Air Management
      7. Application Management
    2. Self-Service Device Onboarding for Employees
      1. Dual-SSID Onboarding
      2. Single-SSID Onboarding
      3. MDM vs. Self-Service Onboarding
    3. Guest WLAN Access
      1. Guest SSID
      2. Guest VLAN
      3. Guest Firewall Policy
      4. Captive Web Portals
      5. Client Isolation, Rate Limiting, and Web Content Filtering
      6. Guest Management
      7. Guest Self-Registration
      8. Employee Sponsorship
      9. Social Login
      10. Encrypted Guest Access
    4. Network Access Control (NAC)
      1. Posture
      2. OS Fingerprinting
      3. AAA
      4. RADIUS Change of Authorization
      5. Single Sign-On
    5. Summary
    6. Exam Essentials
    7. Review Questions
  22. Chapter 11: Wireless Security Troubleshooting
    1. Five Tenets of WLAN Troubleshooting
      1. Troubleshooting Best Practices
      2. Troubleshoot the OSI Model
      3. Most Wi-Fi Problems Are Client Issues
      4. Proper WLAN Design Reduces Problems
      5. WLAN Always Gets the Blame
    2. PSK Troubleshooting
    3. 802.1X/EAP Troubleshooting
      1. 802.1X/EAP Troubleshooting Zones
      2. Zone 1: Backend Communication Problems
      3. Zone 2: Supplicant Certificate Problems
      4. Zone 2: Supplicant Credential Problems
    4. Roaming Troubleshooting
    5. VPN Troubleshooting
    6. Summary
    7. Exam Essentials
    8. Review Questions
  23. Chapter 12: Wireless Security Risks
    1. Unauthorized Rogue Access
      1. Rogue Devices
      2. Rogue Prevention
    2. Eavesdropping
      1. Casual Eavesdropping
      2. Malicious Eavesdropping
      3. Eavesdropping Risks
      4. Eavesdropping Prevention
      5. Authentication Attacks
    3. Denial-of-Service Attacks
      1. Layer 1 DoS Attacks
      2. Layer 2 DoS Attacks
      3. MAC Spoofing
      4. Wireless Hijacking
      5. Management Interface Exploits
      6. Vendor Proprietary Attacks
      7. Physical Damage and Theft
      8. Social Engineering
    4. Guest Access and WLAN Hotspots
    5. Summary
    6. Exam Essentials
    7. Review Questions
  24. Chapter 13: Wireless LAN Security Auditing
    1. WLAN Security Audit
      1. OSI Layer 1 Audit
      2. OSI Layer 2 Audit
      3. Penetration Testing
      4. Wired Infrastructure Audit
      5. Social Engineering Audit
      6. WIPS Audit
      7. Documenting the Audit
      8. Audit Recommendations
    2. WLAN Security Auditing Tools
      1. Linux-Based Tools
    3. Summary
    4. Exam Essentials
    5. Review Questions
  25. Chapter 14: Wireless Security Monitoring
    1. Wireless Intrusion Detection and Prevention Systems (WIDS and WIPS)
      1. WIDS/WIPS Infrastructure Components
      2. WIDS/WIPS Architecture Models
      3. Multiple Radio Sensors
      4. Sensor Placement
    2. Device Classification
      1. Rogue Detection
      2. Rogue Mitigation
      3. Device Tracking
    3. WIDS/WIPS Analysis
      1. Signature Analysis
      2. Behavioral Analysis
      3. Protocol Analysis
      4. Spectrum Analysis
      5. Forensic Analysis
      6. Performance Analysis
    4. Monitoring
      1. Policy Enforcement
      2. Alarms and Notification
      3. False Positives
      4. Reports
    5. 802.11n/ac
    6. 802.11w
    7. Summary
    8. Exam Essentials
    9. Review Questions
  26. Chapter 15: Wireless Security Policies
    1. General Policy
      1. Policy Creation
      2. Policy Management
    2. Functional Policy
      1. Password Policy
      2. RBAC Policy
      3. Change Control Policy
      4. Authentication and Encryption Policy
      5. WLAN Monitoring Policy
      6. Endpoint Policy
      7. Acceptable Use Policy
      8. Physical Security
      9. Remote Office Policy
    3. Government and Industry Regulations
      1. The U.S. Department of Defense (DoD) Directive 8420.1
      2. Federal Information Processing Standards (FIPS) 140-2
      3. The Sarbanes-Oxley Act of 2002 (SOX)
      4. Graham-Leach-Bliley Act (GLBA)
      5. Health Insurance Portability and Accountability Act (HIPAA)
      6. Payment Card Industry (PCI) Standard
      7. Compliance Reports
    4. 802.11 WLAN Policy Recommendations
    5. Summary
    6. Exam Essentials
    7. Review Questions
  27. Appendix A: Answers to Review Questions
    1. Chapter 1: WLAN Security Overview
    2. Chapter 2: Legacy 802.11 Security
    3. Chapter 3: Encryption Ciphers and Methods
    4. Chapter 4: 802.1X/EAP Authentication
    5. Chapter 5: 802.11 Layer 2 Dynamic Encryption Key Generation
    6. Chapter 6: PSK Authentication
    7. Chapter 7: 802.11 Fast Secure Roaming
    8. Chapter 8: WLAN Security Infrastructure
    9. Chapter 9: RADIUS and LDAP
    10. Chapter 10: Bring Your Own Device (BYOD) and Guest Access
    11. Chapter 11: Wireless Security Troubleshooting
    12. Chapter 12: Wireless Security Risks
    13. Chapter 13: Wireless LAN Security Auditing
    14. Chapter 14: Wireless Security Monitoring
    15. Chapter 15: Wireless Security Policies
  28. Appendix B: Abbreviations and Acronyms
    1. Certifications
    2. Organizations and Regulations
    3. Measurements
    4. Technical Terms
  29. Index
  30. Comprehensive Online Learning Environment

Product information

  • Title: CWSP, 2nd Edition
  • Author(s): David D. Coleman, David A. Westcott, Bryan E. Harkins
  • Release date: September 2016
  • Publisher(s): Sybex
  • ISBN: 9781119211082