Muutke küpsiste eelistusi

CWSP Certified Wireless Security Professional Study Guide: Exam CWSP-205 2nd edition [Pehme köide]

  • Formaat: Paperback / softback, 696 pages, kõrgus x laius x paksus: 234x183x36 mm, kaal: 1157 g
  • Ilmumisaeg: 11-Nov-2016
  • Kirjastus: Sybex Inc.,U.S.
  • ISBN-10: 1119211085
  • ISBN-13: 9781119211082
Teised raamatud teemal:
  • Pehme köide
  • Hind: 84,25 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Raamatukogudele
  • Formaat: Paperback / softback, 696 pages, kõrgus x laius x paksus: 234x183x36 mm, kaal: 1157 g
  • Ilmumisaeg: 11-Nov-2016
  • Kirjastus: Sybex Inc.,U.S.
  • ISBN-10: 1119211085
  • ISBN-13: 9781119211082
Teised raamatud teemal:
The most detailed, comprehensive coverage of CWSP-205 exam objectives

CWSP: Certified Wireless Security Professional Study Guide offers comprehensive preparation for the CWSP-205 exam. Fully updated to align with the new 2015 exam, this guide covers all exam objectives and gives you access to the Sybex interactive online learning system so you can go into the test fully confident in your skills. Coverage includes WLAN discovery, intrusion and attack, 802.11 protocol analysis, wireless intrusion prevention system implementation, Layer 2 and 3 VPN over 802.11 networks, managed endpoint security systems, and more. Content new to this edition features discussions about BYOD and guest access, as well as detailed and insightful guidance on troubleshooting. With more than double the coverage of the official exam guide, plus access to interactive learning tools, this book is your ultimate solution for CWSP-205 exam prep.

The CWSP is the leading vendor-neutral security certification administered for IT professionals, developed for those working with and securing wireless networks. As an advanced certification, the CWSP requires rigorous preparation and this book provides more coverage and expert insight than any other source.





Learn the ins and outs of advanced network security Study 100 percent of CWSP-205 objectives Test your understanding with two complete practice exams Gauge your level of preparedness with a pre-test assessment

The CWSP is a springboard for more advanced certifications, and the premier qualification employers look for in the field. If youve already earned the CWTS and the CWNA, its time to take your career to the next level. CWSP: Certified Wireless Security Professional Study Guide is your ideal companion for effective, efficient CWSP-205 preparation.
Foreword xxv
Introduction xxvii
Assessment Test xxxviii
Chapter 1 WLAN Security Overview 1(28)
Standards Organizations
3(9)
International Organization for Standardization (ISO)
3(1)
Institute of Electrical and Electronics Engineers (IEEE)
4(1)
Internet Engineering Task Force (IETF)
5(2)
Wi-Fi Alliance
7(5)
802.11 Networking Basics
12(2)
802.11 Security Basics
14(4)
Data Privacy
14(2)
Authentication, Authorization, Accounting (AAA)
16(1)
Segmentation
17(1)
Monitoring
17(1)
Policy
18(1)
802.11 Security History
18(3)
802.11i Security Amendment and WPA Certifications
18(2)
Robust Security Network (RSN)
20(1)
Summary
21(1)
Exam Essentials
22(2)
Review Questions
24(5)
Chapter 2 Legacy 802.11 Security 29(32)
Authentication
30(5)
Open System Authentication
31(2)
Shared Key Authentication
33(2)
Wired Equivalent Privacy (WEP) Encryption
35(5)
TKIP
40(4)
Virtual Private Networks (VPNs)
44(5)
Point-to-Point Tunneling Protocol (PPTP)
46(1)
Layer 2 Tunneling Protocol (L2TP)
46(1)
Internet Protocol Security (IPsec)
47(1)
Secure Sockets Layer (SSL)
47(1)
VPN Configuration Complexity
48(1)
VPN Scalability
48(1)
MAC Filters
49(1)
SSID Segmentation
50(1)
SSID Cloaking
51(3)
Summary
54(1)
Exam Essentials
55(1)
Review Questions
56(5)
Chapter 3 Encryption Ciphers and Methods 61(26)
Encryption Basics
62(5)
Symmetric and Asymmetric Algorithms
63(2)
Stream and Block Ciphers
65(1)
RC4/ARC4
66(1)
RCS
66(1)
DES
66(1)
3DES
67(1)
AES
67(1)
WLAN Encryption Methods
68(2)
WEP
70(2)
WEP MPDU
70(2)
TKIP
72(1)
TKIP MPDU
72(1)
CCMP
73(5)
CCMP MPDU
76(2)
WPA/WPA2
78(1)
Future Encryption Methods
79(1)
Proprietary Layer 2 Implementations
80(1)
Summary
80(1)
Exam Essentials
81(1)
Review Questions
82(5)
Chapter 4 802.1X/EAP Authentication 87(64)
WLAN Authentication Overview
89(1)
AAA
90(5)
Authentication
91(1)
Authorization
92(1)
Accounting
93(2)
802.1X
95(11)
Supplicant
96(3)
Authenticator
99(3)
Authentication Server
102(4)
Supplicant Credentials
106(8)
Usernames and Passwords
106(1)
Digital Certificates
107(2)
Protected Access Credentials (PACs)
109(1)
One-Time Passwords
109(1)
Smart Cards and USB Tokens
110(2)
Machine Authentication
112(2)
802.1X/EAP and Certificates
114(6)
Server Certificates and Root CA Certificates
115(4)
Client Certificates
119(1)
Shared Secret
120(1)
Legacy Authentication Protocols
121(1)
PAP
121(1)
CHAP
121(1)
MS-CHAP
121(1)
MS-CHAPv2
121(1)
EAP
122(22)
Weak EAP Protocols
125(1)
EAP-MD5
125(1)
EAP-LEAP
126(2)
Strong EAP Protocols
128(2)
EAP-PEAP
130(3)
EAP-TTLS
133(1)
EAP-TLS
134(2)
EAP-FAST
136(5)
Miscellaneous EAP Protocols
141(1)
EAP-SIM
141(1)
EAP-AKA
141(1)
EAP-TEAP
142(2)
Summary
144(1)
Exam Essentials
144(2)
Review Questions
146(5)
Chapter 5 802.11 Layer 2 Dynamic Encryption Key Generation 151(42)
Advantages of Dynamic Encryption
152(32)
Robust Security Network (RSN)
156(5)
RSN Information Element
161(5)
Authentication and Key Management (AKM)
166(4)
RSNA Key Hierarchy
170(4)
4-Way Handshake
174(3)
Group Key Handshake
177(2)
PeerKey Handshake
179(1)
TDLS Peer Key Handshake
180(1)
RSNA Security Associations
181(1)
Passphrase-to-PSK Mapping
182(1)
Roaming and Dynamic Keys
183(1)
Summary
184(1)
Exam Essentials
184(2)
Review Questions
186(7)
Chapter 6 PSK Authentication 193(22)
WPA/WPA2-Personal
194(14)
Preshared Keys (PSK) and Passphrases
195(5)
WPA/WPA2-Personal Risks
200(1)
Entropy
201(2)
Proprietary PSK
203(2)
Simultaneous Authentication of Equals (SAE)
205(3)
Summary
208(1)
Exam Essentials
208(1)
Review Questions
209(6)
Chapter 7 802.11 Fast Secure Roaming 215(42)
History of 802.11 Roaming
216(4)
Client Roaming Thresholds
217(1)
AP-to-AP Handoff
218(2)
RSNA
220(7)
PMKSA
221(3)
PMK Caching
224(1)
Preauthentication
225(2)
Opportunistic Key Caching (OKC)
227(3)
Proprietary FSR
230(1)
Fast BSS Transition (FT)
231(12)
Information Elements
235(1)
FT Initial Mobility Domain Association
236(2)
Over-the-Air Fast BSS Transition
238(1)
Over-the-DS Fast BSS Transition
239(4)
802.11k
243(3)
802.11v
246(1)
Voice Enterprise
247(1)
Layer 3 Roaming
248(2)
Troubleshooting
250(1)
Summary
251(1)
Exam Essentials
251(2)
Review Questions
253(4)
Chapter 8 WLAN Security Infrastructure 257(34)
802.11 Services
258(1)
Integration Service (IS)
258(1)
Distribution System (DS)
259(1)
Management, Control, and Data Planes
259(2)
Management Plane
260(1)
Control Plane
260(1)
Data Plane
261(1)
WLAN Architecture
261(14)
Autonomous WLAN Architecture
261(2)
Centralized Network Management Systems
263(2)
Cloud Networking
265(1)
Centralized WLAN Architecture
265(5)
Distributed WLAN Architecture
270(2)
Unified WLAN Architecture
272(1)
Hybrid Architectures
272(1)
Enterprise WLAN Routers
272(1)
WLAN Mesh Access Points
273(1)
WLAN Bridging
274(1)
VPN Wireless Security
275(4)
VPN 101
275(2)
Layer 3 VPNs
277(1)
SSL VPN
278(1)
VPN Deployment
278(1)
Infrastructure Management
279(6)
Protocols for Management
280(5)
Summary
285(1)
Exam Essentials
285(1)
Review Questions
286(5)
Chapter 9 RADIUS and LDAP 291(28)
LDAP
292(1)
RADIUS
293(14)
Authentication and Authorization
294(1)
Accounting
295(1)
RADIUS Configuration
296(2)
LDAP Proxy
298(1)
RADIUS Deployment Models
299(4)
RADIUS Proxy
303(1)
RADIUS Proxy and Realms
304(1)
RADIUS Failover
305(1)
WLAN Devices as RADIUS Servers
306(1)
Captive Web Portal and MAC Authentication
306(1)
RadSec
307(1)
Attribute-Value Pairs
307(4)
Vendor-Specific Attributes
308(1)
VL AN Assignment
309(1)
Role-Based Access Control
310(1)
LDAP Attributes
311(1)
Summary
311(1)
Exam Essentials
311(2)
Review Questions
313(6)
Chapter 10 Bring Your Own Device (BYOD) and Guest Access 319(46)
Mobile Device Management
322(14)
Company-Issued Devices vs. Personal Devices
323(1)
MDM Architecture
324(1)
MDM Enrollment
325(4)
MDM Profiles
329(2)
MDM Agent Software
331(1)
Over-the-Air Management
332(3)
Application Management
335(1)
Self-Service Device Onboarding for Employees
336(3)
Dual-SSID Onboarding
337(1)
Single-SSID Onboarding
338(1)
MDM vs. Self-Service Onboarding
339(1)
Guest WLAN Access
339(13)
Guest SSID
340(1)
Guest VLAN
340(1)
Guest Firewall Policy
341(1)
Captive Web Portals
342(3)
Client Isolation, Rate Limiting, and Web Content Filtering
345(1)
Guest Management
345(2)
Guest Self-Registration
347(1)
Employee Sponsorship
348(1)
Social Login
349(2)
Encrypted Guest Access
351(1)
Network Access Control (NAC)
352(6)
Posture
352(1)
OS Fingerprinting
353(1)
AAA
354(1)
RADIUS Change of Authorization
355(1)
Single Sign-On
356(2)
Summary
358(1)
Exam Essentials
359(1)
Review Questions
360(5)
Chapter 11 Wireless Security Troubleshooting 365(32)
Five Tenets of WLAN Troubleshooting
366(6)
Troubleshooting Best Practices
366(3)
Troubleshoot the OSI Model
369(1)
Most Wi-Fi Problems Are Client Issues
370(2)
Proper WLAN Design Reduces Problems
372(1)
WLAN Always Gets the Blame
372(1)
PSK Troubleshooting
372(2)
802.1X/EAP Troubleshooting
374(8)
802.1X/EAP Troubleshooting Zones
375(1)
Zone 1: Backend Communication Problems
376(2)
Zone 2: Supplicant Certificate Problems
378(2)
Zone 2: Supplicant Credential Problems
380(2)
Roaming Troubleshooting
382(2)
VPN Troubleshooting
384(3)
Summary
387(1)
Exam Essentials
387(1)
Review Questions
388(9)
Chapter 12 Wireless Security Risks 397(42)
Unauthorized Rogue Access
398(6)
Rogue Devices
398(4)
Rogue Prevention
402(2)
Eavesdropping
404(7)
Casual Eavesdropping
404(2)
Malicious Eavesdropping
406(1)
Eavesdropping Risks
407(2)
Eavesdropping Prevention
409(1)
Authentication Attacks
409(2)
Denial-of-Service Attacks
411(21)
Layer 1 DoS Attacks
412(4)
Layer 2 DoS Attacks
416(4)
MAC Spoofing
420(3)
Wireless Hijacking
423(4)
Management Interface Exploits
427(1)
Vendor Proprietary Attacks
428(1)
Physical Damage and Theft
428(2)
Social Engineering
430(2)
Guest Access and WLAN Hotspots
432(1)
Summary
433(1)
Exam Essentials
433(1)
Review Questions
434(5)
Chapter 13 Wireless LAN Security Auditing 439(30)
WLAN Security Audit
440(17)
OSI Layer 1 Audit
442(5)
OSI Layer 2 Audit
447(2)
Penetration Testing
449(4)
Wired Infrastructure Audit
453(1)
Social Engineering Audit
453(1)
WIPS Audit
454(1)
Documenting the Audit
455(1)
Audit Recommendations
456(1)
WLAN Security Auditing Tools
457(5)
Linux-Based Tools
459(3)
Summary
462(1)
Exam Essentials
463(1)
Review Questions
464(5)
Chapter 14 Wireless Security Monitoring 469(46)
Wireless Intrusion Detection and Prevention Systems (WIDS and WIPS)
470(10)
WIDS/WIPS Infrastructure Components
471(3)
WIDS/WIPS Architecture Models
474(4)
Multiple Radio Sensors
478(1)
Sensor Placement
479(1)
Device Classification
480(14)
Rogue Detection
482(4)
Rogue Mitigation
486(3)
Device Tracking
489(5)
WIDS/WIPS Analysis
494(7)
Signature Analysis
494(1)
Behavioral Analysis
495(1)
Protocol Analysis
496(2)
Spectrum Analysis
498(1)
Forensic Analysis
499(1)
Performance Analysis
500(1)
Monitoring
501(5)
Policy Enforcement
501(2)
Alarms and Notification
503(2)
False Positives
505(1)
Reports
506(1)
802.11n/ac
506(2)
802.11w
508(1)
Summary
509(1)
Exam Essentials
509(2)
Review Questions
511(4)
Chapter 15 Wireless Security Policies 515(36)
General Policy
517(4)
Policy Creation
517(3)
Policy Management
520(1)
Functional Policy
521(7)
Password Policy
522(1)
RBAC Policy
523(1)
Change Control Policy
524(1)
Authentication and Encryption Policy
524(1)
WLAN Monitoring Policy
525(1)
Endpoint Policy
525(1)
Acceptable Use Policy
526(1)
Physical Security
527(1)
Remote Office Policy
527(1)
Government and Industry Regulations
528(14)
The U.S. Department of Defense (DoD) Directive 8420.1
529(1)
Federal Information Processing Standards (FIPS) 140-2
530(2)
The Sarbanes-Oxley Act of 2002 (SOX)
532(2)
Graham-Leach-Bliley Act (GLBA)
534(2)
Health Insurance Portability and Accountability Act (HIPAA)
536(2)
Payment Card Industry (PCI) Standard
538(3)
Compliance Reports
541(1)
802.11 WLAN Policy Recommendations
542(1)
Summary
543(1)
Exam Essentials
543(2)
Review Questions
545(6)
Appendix A Answers to Review Questions 551(44)
Chapter 1: WLAN Security Overview
552(2)
Chapter 2: Legacy 802.11 Security
554(2)
Chapter 3: Encryption Ciphers and Methods
556(3)
Chapter 4: 802.1X/EAP Authentication
559(3)
Chapter 5: 802.11 Layer 2 Dynamic Encryption Key Generation
562(3)
Chapter 6: PSK Authentication
565(3)
Chapter 7: 802.11 Fast Secure Roaming
568(3)
Chapter 8: WLAN Security Infrastructure
571(3)
Chapter 9: RADIUS and LDAP
574(2)
Chapter 10: Bring Your Own Device (BYOD) and Guest Access
576(3)
Chapter 11: Wireless Security Troubleshooting
579(3)
Chapter 12: Wireless Security Risks
582(3)
Chapter 13: Wireless LAN Security Auditing
585(3)
Chapter 14: Wireless Security Monitoring
588(4)
Chapter 15: Wireless Security Policies
592(3)
Appendix B Abbreviations and Acronyms 595(18)
Certifications
596(1)
Organizations and Regulations
596(1)
Measurements
597(1)
Technical Terms
597(16)
Index 613
David D. Coleman, CWNE #4, is a WLAN security consultant, technical trainer, public speaker, and the Senior Mobility Leader for Aerohive Networks. David A. Westcott, CWNE #7, is an independent consultant and WLAN technical trainer of over thirty years. Bryan Harkins, CWNE #44, is a WLAN technical trainer, consultant, and the Director of Cradlepoint University.