04435nam 2200517 450 991027103010332120160919011216.01-119-41934-41-119-24413-7(CKB)3710000000852006(EBL)4675498(MiAaPQ)EBC4675498(CaSebORM)9781119211082(EXLCZ)99371000000085200620160923h20172017 uy 0engur|n|---|||||rdacontentrdamediardacarrierCWSP certified wireless security professional study guide CWSP-205 /David Coleman, David Westcott, Bryan Harkins2nd ed.Indianapolis, Indiana :Sybex,2017.©20171 online resource (699 p.)Includes index.1-119-21108-5 CWSP® Certified Wireless Security Professional: Study Guide CWSP-205; Acknowledgments; About the Authors; Contents at a Glance; Contents; Table of Exercises; Foreword; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1 WLAN Security Overview; Standards Organizations; International Organization for Standardization (ISO); Institute of Electrical and Electronics Engineers (IEEE); Internet Engineering Task Force (IETF); Wi-Fi Alliance; 802.11 Networking Basics; 802.11 Security Basics; Data Privacy; Authentication, Authorization, Accounting (AAA); Segmentation; Monitoring; Policy802.11 Security History802.11i Security Amendment and WPA Certifications; Robust Security Network (RSN); Summary; Exam Essentials; Review Questions; Chapter 2 Legacy 802.11 Security; Authentication; Open System Authentication; Shared Key Authentication; Wired Equivalent Privacy (WEP) Encryption; TKIP; Virtual Private Networks (VPNs); Point-to-Point Tunneling Protocol (PPTP); Layer 2 Tunneling Protocol (L2TP); Internet Protocol Security (IPsec); Secure Sockets Layer (SSL); VPN Configuration Complexity; VPN Scalability; MAC Filters; SSID Segmentation; SSID Cloaking; Summary; Exam EssentialsReview QuestionsChapter 3 Encryption Ciphers and Methods; Encryption Basics; Symmetric and Asymmetric Algorithms; Stream and Block Ciphers; RC4/ARC4; RC5; DES; 3DES; AES; WLAN Encryption Methods; WEP; WEP MPDU; TKIP; TKIP MPDU; CCMP; CCMP MPDU; WPA/WPA2; Future Encryption Methods; Proprietary Layer 2 Implementations; Summary; Exam Essentials; Review Questions; Chapter 4 802.1X/EAP Authentication; WLAN Authentication Overview; AAA; Authentication; Authorization; Accounting; 802.1X; Supplicant; Authenticator; Authentication Server; Supplicant Credentials; Usernames and PasswordsDigital CertificatesProtected Access Credentials (PACs); One-time Passwords; Smart Cards and USB Tokens; Machine Authentication; 802.1X/EAP and Certificates; Server Certificates and Root CA Certificates; Client Certificates; Shared Secret; Legacy Authentication Protocols; PAP; CHAP; MS-CHAP; MS-CHAPv2; EAP; Weak EAP Protocols; EAP-MD5; EAP-LEAP; Strong EAP Protocols; EAP-PEAP; EAP-TTLS; EAP-TLS; EAP-FAST; Miscellaneous EAP Protocols; EAP-SIM; EAP-AKA; EAP-TEAP; Summary; Exam Essentials; Review Questions; Chapter 5 802.11 Layer 2 Dynamic Encryption Key GenerationAdvantages of Dynamic EncryptionRobust Security Network (RSN); RSN Information Element; Authentication and Key Management (AKM); RSNA Key Hierarchy; 4-Way Handshake; Group Key Handshake; PeerKey Handshake; TDLS Peer Key Handshake; RSNA Security Associations; Passphrase-to-PSK Mapping; Roaming and Dynamic Keys; Summary; Exam Essentials; Review Questions; Chapter 6 PSK Authentication; WPA/WPA2-Personal; Preshared Keys (PSK) and Passphrases; WPA/WPA2-Personal Risks; Entropy; Proprietary PSK; Simultaneous Authentication of Equals (SAE); Summary; Exam Essentials; Review QuestionsChapter 7 802.11 Fast Secure RoamingWireless communication systemsSecurity measuresElectronic data processing personnelCertificationStudy guidesWireless communication systemsSecurity measures.Electronic data processing personnelCertification005.8Coleman David410090MiAaPQMiAaPQMiAaPQBOOK9910271030103321CWSP2592778UNINA