Book description
Sybex is now the official publisher for Certified Wireless Network Professional, the certifying vendor for the CWSP program. This guide covers all exam objectives, including WLAN discovery techniques, intrusion and attack techniques, 802.11 protocol analysis. Wireless intrusion-prevention systems implementation, layer 2 and 3 VPNs used over 802.11 networks, and managed endpoint security systems. It also covers enterprise/SMB/SOHO/Public-Network Security design models and security solution implementation, building robust security networks, wireless LAN management systems, and much more.
Table of contents
- Copyright
- Dear Reader,
- Acknowledgments
- About the Authors
- Foreword
- Introduction
- Assessment Test
- 1. WLAN Security Overview
- 2. Legacy 802.11 Security
- 3. Encryption Ciphers and Methods
-
4. Enterprise 802.11 Layer 2 Authentication Methods
- 4.1. WLAN Authentication Overview
- 4.2. AAA
- 4.3. 802.1X
- 4.4. Supplicant Credentials
- 4.5. Authentication Server Credentials
- 4.6. Shared Secret
- 4.7. Legacy Authentication Protocols
- 4.8. EAP
- 4.9. Summary
- 4.10. Exam Essentials
- 4.11. Key Terms
- 4.12. Review Questions
- 4.13. Answers to Review Questions
-
5. 802.11 Layer 2 Dynamic Encryption Key Generation
- 5.1. Advantages of Dynamic Encryption
-
5.2. Robust Security Network (RSN)
- 5.2.1. RSN Information Element
- 5.2.2. Authentication and Key Management (AKM)
- 5.2.3. RSNA Key Hierarchy
- 5.2.4. Master Session Key (MSK)
- 5.2.5. Master Keys
- 5.2.6. Temporal Keys
- 5.2.7. 4-Way Handshake
- 5.2.8. Group Key Handshake
- 5.2.9. PeerKey Handshake
- 5.2.10. RSNA Security Associations
- 5.2.11. Passphrase-to-PSK Mapping
- 5.2.12. Roaming and Dynamic Keys
- 5.3. Summary
- 5.4. Exam Essentials
- 5.5. Key Terms
- 5.6. Review Questions
- 5.7. Answers to Review Questions
-
6. SOHO 802.11 Security
- 6.1. WPA/WPA2-Personal
- 6.2. Wi-Fi Protected Setup (WPS)
- 6.3. SOHO Security Best Practices
- 6.4. Summary
- 6.5. Exam Essentials
- 6.6. Key Terms
- 6.7. Review Questions
- 6.8. Answers to Review Questions
-
7. 802.11 Fast Secure Roaming
- 7.1. History of 802.11 Roaming
- 7.2. RSNA
- 7.3. Opportunistic Key Caching (OKC)
- 7.4. Proprietary FSR
- 7.5. Fast BSS Transition (FT)
- 7.6. 802.11k
- 7.7. Voice Personal and Voice Enterprise
- 7.8. Layer 3 Roaming
- 7.9. Troubleshooting
- 7.10. SCA Roaming
- 7.11. Exam Essentials
- 7.12. Key Terms
- 7.13. Review Questions
- 7.14. Answers to Review Questions
- 8. Wireless Security Risks
- 9. Wireless LAN Security Auditing
-
10. Wireless Security Monitoring
- 10.1. Wireless Intrusion Detection and Prevention Systems (WIDS and WIPS)
- 10.2. Device Classification
- 10.3. WIDS/WIPS Analysis
- 10.4. Monitoring
- 10.5. 802.11n
- 10.6. Proprietary WIPS
- 10.7. 802.11w
- 10.8. Summary
- 10.9. Exam Essentials
- 10.10. Key Terms
- 10.11. Review Questions
- 10.12. Answers to Review Questions
- 11. VPNs, Remote Access, and Guest Access Services
-
12. WLAN Security Infrastructure
- 12.1. WLAN Architecture Capabilities Overview
- 12.2. Device Management
- 12.3. RADIUS/LDAP Servers
- 12.4. Public Key Infrastructure (PKI)
- 12.5. Role-Based Access Control
- 12.6. Enterprise Encryption Gateways
- 12.7. Summary
- 12.8. Exam Essentials
- 12.9. Key Terms
- 12.10. Review Questions
- 12.11. Answers to Review Questions
-
13. Wireless Security Policies
- 13.1. General Policy
- 13.2. Functional Policy
-
13.3. Government and Industry Regulations
- 13.3.1. The US Department of Defense (DoD) Directive 8100.2
- 13.3.2. Federal Information Processing Standards (FIPS) 140-2
- 13.3.3. The Sarbanes-Oxley Act of 2002 (SOX)
- 13.3.4. Health Insurance Portability and Accountability Act (HIPAA)
- 13.3.5. Payment Card Industry (PCI) Standard
- 13.3.6. Compliance Reports
- 13.4. 802.11 WLAN Policy Recommendations
- 13.5. Summary
- 13.6. Exam Essentials
- 13.7. Key Terms
- 13.8. Review Questions
- 13.9. Answers to Review Questions
-
A. Abbreviations, Acronyms, and Regulations
- A.1.
-
A.2. Power Regulations
- A.2.1. 2.4 GHz ISM Point-to-Multipoint (PtMP) Communications
- A.2.2. 5 GHz UNII Point-to-Multipoint (PtMP) Communications
- A.2.3. 2.4 GHz ISM Point-to-Point (PtP) Communications
- A.2.4. 5 GHz UNII Point-to-Point (PtP) Communications
- A.2.5. Windows Registry Values that Control Preauthentication and PMK Caching
- B. WLAN Vendors
- C. About the Companion CD
- Glossary
Product information
- Title: CWSP® Certified Wireless Security Professional Official: Study Guide
- Author(s):
- Release date: February 2010
- Publisher(s): Sybex
- ISBN: 9780470438916
You might also like
book
CWNA Certified Wireless Network Administrator & CWSP Certified Wireless Security Professional All-in-One Exam Guide (PW0-104 & PW0-204)
Get complete coverage of all the material included on the CWNA and CWSP exams inside this …
book
CWNA: Certified Wireless Network Administrator Official Study Guide: Exam CWNA-106
Prepare with the only official study guide for the CWNA-106 The CWNA: Certified Wireless Network Administrator …
book
CWAP® Certified Wireless Analysis Professional: Official Study Guide
The official study guide for the Certified Wireless Analysis Professional certification from CWNP Four leading wireless …
book
CCNA Wireless 640-722 Official Cert Guide
CCNA Wireless 640-722 Official Cert Guide CCNA Wireless 640-722 Official Cert Guide from Cisco Press enables …