CWSP: Certified Wireless Security Professional Official Study Guide (Exam PW0-204)
Buy Rights Online Buy Rights

Rights Contact Login For More Details

  • Wiley

More About This Title CWSP: Certified Wireless Security Professional Official Study Guide (Exam PW0-204)

English

Sybex is now the official publisher for Certified Wireless Network Professional, the certifying vendor for the CWSP program. This guide covers all exam objectives, including WLAN discovery techniques, intrusion and attack techniques, 802.11 protocol analysis. Wireless intrusion-prevention systems implementation, layer 2 and 3 VPNs used over 802.11 networks, and managed endpoint security systems. It also covers enterprise/SMB/SOHO/Public-Network Security design models and security solution implementation, building robust security networks, wireless LAN management systems, and much more.

English

David D. Coleman, CWNE #4, CWNA, CWSP, CWNT, is a WLAN security consultant and technical trainer with over twenty years of IT experience. The company he founded, AirSpy Networks (www.airspy.com), specializes in corporate WLAN training.

David A. Westcott, CWNE #7, CWNA, CWSP, CWNT, is an independent consultant and WLAN technical trainer with over twenty years ofexperience. He has been a certified trainer for over fifteen years.

Bryan E. Harkins, CWNE #44, CWSP,CWNA, CWNT, is the Training and Development Manager for Motorola AirDefense Solutions, a market leader in wireless intrusion prevention systems.

Shawn M. Jackman, CWNE #54, CWNA, CWSP, CWAP is a principal WLAN engineer with Kaiser Permanente. He has over fifteen years' experience working with wireless manufacturers and integrators.

English

Introduction xxvii

Assessment Test xlii

Chapter 1 WLAN Security Overview 1

Chapter 2 Legacy 802.11 Security 31

Chapter 3 Encryption Ciphers and Methods 65

Chapter 4 Enterprise 802.11 Layer 2 Authentication Methods 101

Chapter 5 802.11 Layer 2 Dynamic Encryption Key Generation 173

Chapter 6 SOHO 802.11 Security 221

Chapter 7 802.11 Fast Secure Roaming 249

Chapter 8 Wireless Security Risks 291

Chapter 9 Wireless LAN Security Auditing 337

Chapter 10 Wireless Security Monitoring 369

Chapter 11 VPNs, Remote Access, and Guest Access Services 429

Chapter 12 WLAN Security Infrastructure 455

Chapter 13 Wireless Security Policies 509

Appendix A Abbreviations, Acronyms, and Regulations 553

Appendix B WLAN Vendors 575

Appendix C About the Companion CD 579

Glossary 583

Index 623

loading