CWSP: Certified Wireless Security Professional Study Guide CWSP-205, 2nd Edition
Buy Rights Online Buy Rights

Rights Contact Login For More Details

  • Wiley

More About This Title CWSP: Certified Wireless Security Professional Study Guide CWSP-205, 2nd Edition

English

The most detailed, comprehensive coverage of CWSP-205 exam objectives

CWSP: Certified Wireless Security Professional Study Guide offers comprehensive preparation for the CWSP-205 exam. Fully updated to align with the new 2015 exam, this guide covers all exam objectives and gives you access to the Sybex interactive online learning system so you can go into the test fully confident in your skills. Coverage includes WLAN discovery, intrusion and attack, 802.11 protocol analysis, wireless intrusion prevention system implementation, Layer 2 and 3 VPN over 802.11 networks, managed endpoint security systems, and more. Content new to this edition features discussions about BYOD and guest access, as well as detailed and insightful guidance on troubleshooting. With more than double the coverage of the “official” exam guide, plus access to interactive learning tools, this book is your ultimate solution for CWSP-205 exam prep.

The CWSP is the leading vendor-neutral security certification administered for IT professionals, developed for those working with and securing wireless networks. As an advanced certification, the CWSP requires rigorous preparation — and this book provides more coverage and expert insight than any other source.

  • Learn the ins and outs of advanced network security
  • Study 100 percent of CWSP-205 objectives
  • Test your understanding with two complete practice exams
  • Gauge your level of preparedness with a pre-test assessment

The CWSP is a springboard for more advanced certifications, and the premier qualification employers look for in the field. If you’ve already earned the CWTS and the CWNA, it’s time to take your career to the next level. CWSP: Certified Wireless Security Professional Study Guide is your ideal companion for effective, efficient CWSP-205 preparation.

English

David D. Coleman, CWNE #4, is a WLAN security consultant, technical trainer, public speaker, and the Senior Mobility Leader for Aerohive Networks.
David A. Westcott, CWNE #7, is an independent consultant and WLAN technical trainer of over thirty years.
Bryan Harkins, CWNE #44, is a WLAN technical trainer, consultant, and the Director of Cradlepoint University.

English

Foreword xxv

Introduction xxvii

Assessment Test xxxviii

Chapter 1 WLAN Security Overview 1

Standards Organizations 3

International Organization for Standardization (ISO) 3

Institute of Electrical and Electronics Engineers (IEEE) 4

Internet Engineering Task Force (IETF) 5

Wi-Fi Alliance 7

802.11 Networking Basics 12

802.11 Security Basics 14

Data Privacy 14

Authentication, Authorization, Accounting (AAA) 16

Segmentation 17

Monitoring 17

Policy 18

802.11 Security History 18

802.11i Security Amendment and WPA Certifications 18

Robust Security Network (RSN) 20

Summary 21

Exam Essentials 22

Review Questions 24

Chapter 2 Legacy 802.11 Security 29

Authentication 30

Open System Authentication 31

Shared Key Authentication 33

Wired Equivalent Privacy (WEP) Encryption 35

TKIP 40

Virtual Private Networks (VPNs) 44

Point-to-Point Tunneling Protocol (PPTP) 46

Layer 2 Tunneling Protocol (L2TP) 46

Internet Protocol Security (IPsec) 47

Secure Sockets Layer (SSL) 47

VPN Configuration Complexity 48

VPN Scalability 48

MAC Filters 49

SSID Segmentation 50

SSID Cloaking 51

Summary 54

Exam Essentials 55

Review Questions 56

Chapter 3 Encryption Ciphers and Methods 61

Encryption Basics 62

Symmetric and Asymmetric Algorithms 63

Stream and Block Ciphers 65

RC4/ARC4 66

RC5 66

DES 66

3DES 67

AES 67

WLAN Encryption Methods 68

WEP 70

WEP MPDU 70

TKIP 72

TKIP MPDU 72

CCMP 73

CCMP MPDU 76

WPA/WPA2 78

Future Encryption Methods 79

Proprietary Layer 2 Implementations 80

Summary 80

Exam Essentials 81

Review Questions 82

Chapter 4 802.1X/EAP Authentication 87

WLAN Authentication Overview 89

AAA 90

Authentication 91

Authorization 92

Accounting 93

802.1X 95

Supplicant 96

Authenticator 99

Authentication Server 102

Supplicant Credentials 106

Usernames and Passwords 106

Digital Certificates 107

Protected Access Credentials (PACs) 109

One-T - ime Passwords 109

Smart Cards and USB Tokens 110

Machine Authentication 112

802.1X/EAP and Certificates 114

Server Certificates and Root CA Certificates 115

Client Certificates 119

Shared Secret 120

Legacy Authentication Protocols 121

PAP 121

CHAP 121

MS-CHAP 121

MS-CHAPv2 121

EAP 122

Weak EAP Protocols 125

EAP-MD5 125

EAP-LEAP 126

Strong EAP Protocols 128

EAP-PEAP 130

EAP-TTLS 133

EAP-TLS 134

EAP-FAST 136

Miscellaneous EAP Protocols 141

EAP-SIM 141

EAP-AKA 141

EAP-TEAP 142

Summary 144

Exam Essentials 144

Review Questions 146

Chapter 5 802.11 Layer 2 Dynamic Encryption Key Generation 151

Advantages of Dynamic Encryption 152

Robust Security Network (RSN) 156

RSN Information Element 161

Authentication and Key Management (AKM) 166

RSNA Key Hierarchy 170

4‐Way Handshake 174

Group Key Handshake 177

PeerKey Handshake 179

TDLS Peer Key Handshake 180

RSNA Security Associations 181

Passphrase‐to‐PSK Mapping 182

Roaming and Dynamic Keys 183

Summary 184

Exam Essentials 184

Review Questions 186

Chapter 6 PSK Authentication 193

WPA/WPA2-Personal 194

Preshared Keys (PSK) and Passphrases 195

WPA/WPA2-Personal Risks 200

Entropy 201

Proprietary PSK 203

Simultaneous Authentication of Equals (SAE) 205

Summary 208

Exam Essentials 208

Review Questions 209

Chapter 7 802.11 Fast Secure Roaming 215

History of 802.11 Roaming 216

Client Roaming Thresholds 217

AP-to-AP Handoff 218

RSNA 220

PMKSA 221

PMK Caching 224

Preauthentication 225

Opportunistic Key Caching (OKC) 227

Proprietary FSR 230

Fast BSS Transition (FT) 231

Information Elements 235

FT Initial Mobility Domain Association 236

Over-the-Air Fast BSS Transition 238

Over-the-DS Fast BSS Transition 239

802.11k 243

802.11v 246

Voice Enterprise 247

Layer 3 Roaming 248

Troubleshooting 250

Summary 251

Exam Essentials 251

Review Questions 253

Chapter 8 WLAN Security Infrastructure 257

802.11 Services 258

Integration Service (IS) 258

Distribution System (DS) 259

Management, Control, and Data Planes 259

Management Plane 260

Control Plane 260

Data Plane 261

WLAN Architecture 261

Autonomous WLAN Architecture 261

Centralized Network Management Systems 263

Cloud Networking 265

Centralized WLAN Architecture 265

Distributed WLAN Architecture 270

Unified WLAN Architecture 272

Hybrid Architectures 272

Enterprise WLAN Routers 272

WLAN Mesh Access Points 273

WLAN Bridging 274

VPN Wireless Security 275

VPN 101 275

Layer 3 VPNs 277

SSL VPN 278

VPN Deployment 278

Infrastructure Management 279

Protocols for Management 280

Summary 285

Exam Essentials 285

Review Questions 286

Chapter 9 RADIUS and LDAP 291

LDAP 292

RADIUS 293

Authentication and Authorization 294

Accounting 295

RADIUS Configuration 296

LDAP Proxy 298

RADIUS Deployment Models 299

RADIUS Proxy 303

RADIUS Proxy and Realms 304

RADIUS Failover 305

WLAN Devices as RADIUS Servers 306

Captive Web Portal and MAC Authentication 306

RadSec 307

Attribute-Value Pairs 307

Vendor-Specific Attributes 308

VLAN Assignment 309

Role-Based Access Control 310

LDAP Attributes 311

Summary 311

Exam Essentials 311

Review Questions 313

Chapter 10 Bring Your Own Device (BYOD) and Guest Access 319

Mobile Device Management 322

Company-Issued Devices vs. Personal Devices 323

MDM Architecture 324

MDM Enrollment 325

MDM Profiles 329

MDM Agent Software 331

Over-the-Air Management 332

Application Management 335

Self-Service Device Onboarding for Employees 336

Dual-SSID Onboarding 337

Single-SSID Onboarding 338

MDM vs. Self-Service Onboarding 339

Guest WLAN Access 339

Guest SSID 340

Guest VLAN 340

Guest Firewall Policy 341

Captive Web Portals 342

Client Isolation, Rate Limiting, and

Web Content Filtering 345

Guest Management 345

Guest Self-Registration 347

Employee Sponsorship 348

Social Login 349

Encrypted Guest Access 351

Network Access Control (NAC) 352

Posture 352

OS Fingerprinting 353

AAA 354

RADIUS Change of Authorization 355

Single Sign-On 356

Summary 358

Exam Essentials 359

Review Questions 360

Chapter 11 Wireless Security Troubleshooting 365

Five Tenets of WLAN Troubleshooting 366

Troubleshooting Best Practices 366

Troubleshoot the OSI Model 369

Most Wi-Fi Problems Are Client Issues 370

Proper WLAN Design Reduces Problems 372

WLAN Always Gets the Blame 372

PSK Troubleshooting 372

802.1X/EAP Troubleshooting 374

802.1X/EAP Troubleshooting Zones 375

Zone 1: Backend Communication Problems 376

Zone 2: Supplicant Certificate Problems 378

Zone 2: Supplicant Credential Problems 380

Roaming Troubleshooting 382

VPN Troubleshooting 384

Summary 387

Exam Essentials 387

Review Questions 388

Chapter 12 Wireless Security Risks 397

Unauthorized Rogue Access 398

Rogue Devices 398

Rogue Prevention 402

Eavesdropping 404

Casual Eavesdropping 404

Malicious Eavesdropping 406

Eavesdropping Risks 407

Eavesdropping Prevention 409

Authentication Attacks 409

Denial-of-Service Attacks 411

Layer 1 DoS Attacks 412

Layer 2 DoS Attacks 416

MAC Spoofing 420

Wireless Hijacking 423

Management Interface Exploits 427

Vendor Proprietary Attacks 428

Physical Damage and Theft 428

Social Engineering 430

Guest Access and WLAN Hotspots 432

Summary 433

Exam Essentials 433

Review Questions 434

Chapter 13 Wireless LAN Security Auditing 439

WLAN Security Audit 440

OSI Layer 1 Audit 442

OSI Layer 2 Audit 447

Penetration Testing 449

Wired Infrastructure Audit 453

Social Engineering Audit 453

WIPS Audit 454

Documenting the Audit 455

Audit Recommendations 456

WLAN Security Auditing Tools 457

Linux-Based Tools 459

Summary 462

Exam Essentials 463

Review Questions 464

Chapter 14 Wireless Security Monitoring 469

Wireless Intrusion Detection and Prevention Systems

(WIDS and WIPS) 470

WIDS/WIPS Infrastructure Components 471

WIDS/WIPS Architecture Models 474

Multiple Radio Sensors 478

Sensor Placement 479

Proprietary WIPS 480

Device Classification 482

Rogue Detection 484

Rogue Mitigation 488

Device Tracking 491

WIDS/WIPS Analysis 496

Signature Analysis 496

Behavioral Analysis 497

Protocol Analysis 498

Spectrum Analysis 500

Forensic Analysis 501

Performance Analysis 502

Monitoring 503

Policy Enforcement 503

Alarms and Notification 505

False Positives 507

Reports 508

802.11n/ac 508

802.11w 510

Summary 511

Exam Essentials 511

Review Questions 513

Chapter 15 Wireless Security Policies 517

General Policy 519

Policy Creation 519

Policy Management 522

Functional Policy 523

Password Policy 524

RBAC Policy 525

Change Control Policy 526

Authentication and Encryption Policy 526

WLAN Monitoring Policy 527

Endpoint Policy 527

Acceptable Use Policy 528

Physical Security 529

Remote Office Policy 529

Government and Industry Regulations 530

The U.S. Department of Defense (DoD) Directive 8420.1 531

Federal Information Processing Standards (FIPS) 140-2 532

The Sarbanes-Oxley Act of 2002 (SOX) 534

Graham-Leach-Bliley Act (GLBA) 536

Health Insurance Portability and Accountability Act (HIPAA) 538

Payment Card Industry (PCI) Standard 540

Compliance Reports 543

802.11 WLAN Policy Recommendations 544

Summary 545

Exam Essentials 545

Review Questions 547

Appendix A Answers to Review Questions 553

Chapter 1: WLAN Security Overview 554

Chapter 2: Legacy 802.11 Security 556

Chapter 3: Encryption Ciphers and Methods 558

Chapter 4: 802.1X/EAP Authentication 561

Chapter 5: 802.11 Layer 2 Dynamic Encryption Key Generation 563

Chapter 6: PSK Authentication 567

Chapter 7: 802.11 Fast Secure Roaming 570

Chapter 8: WLAN Security Infrastructure 573

Chapter 9: RADIUS and LDAP 576

Chapter 10: Bring Your Own Device (BYOD) and Guest Access 578

Chapter 11: Wireless Security Troubleshooting 581

Chapter 12: Wireless Security Risks 584

Chapter 13: Wireless LAN Security Auditing 587

Chapter 14: Wireless Security Monitoring 590

Chapter 15: Wireless Security Policies 594

Appendix B Abbreviations and Acronyms 597

Certifications 598

Organizations and Regulations 598

Measurements 599

Technical Terms 599

Index 615

loading