1. Trang chủ
  2. » Công Nghệ Thông Tin

CWSP certified wireless security professional official study guide exam PW0 204

703 178 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 703
Dung lượng 14,1 MB

Nội dung

Jackman Certifi ed Wireless Security Professional Offi cial Study Guide The Offi cial Study Guide for • Case Studies and Demo Software Prepare for the Certifi ed Wireless Security Profe

Trang 1

Free ebooks ==> www.Ebook777.com

David D Coleman David A Westcott Bryan E Harkins Shawn M Jackman

Certifi ed Wireless Security Professional Offi cial Study Guide

The Offi cial Study Guide for

• Case Studies and Demo Software

Prepare for the Certifi ed Wireless Security Professional exam (PW0-204)

with this new Offi cial Study Guide from CWNP This comprehensive resource

covers everything you need for the exam, including wireless security basics,

risks, and policies; legacy 802.11 security and robust network security (RSN);

encryption ciphers and methods; enterprise 802.11 layer 2 authentication

methods; fast secure roaming, wireless intrusion prevention; and many

other essential WLAN security topics and concepts Inside you’ll fi nd:

• Full coverage of all exam objectives in a systematic approach, so you can

be confi dent you’re getting the instruction you need for the exam

• Practical hands-on exercises to reinforce critical skills

• Real-world scenarios that put what you’ve learned in the context of actual

job roles

• Challenging review questions in each chapter to prepare you for exam day

• Exam Essentials, a key feature in each chapter that identifi es critical areas

you must become profi cient in before taking the exam

• White papers, demo software, practice exams, and over 150 fl ashcards on

the CD to further facilitate your learning

• A handy tear card that maps every offi cial exam objective to the

corresponding chapter in the book, so you can track your exam prep

Exam PW0-204

A B O U T T H E A U T H O R S

David D Coleman, CWNE #4, CWNA, CWSP, CWNT, is a WLAN security consultant and technical

trainer with over twenty years of IT experience The company he founded, AirSpy Networks

(www.airspy.com), specializes in corporate WLAN training David A Westcott, CWNE #7, CWNA,

CWSP, CWNT, is an independent consultant and WLAN technical trainer with over twenty years of

experience He has been a certifi ed trainer for over fi fteen years Bryan E Harkins, CWNE #44, CWSP,

CWNA, CWNT, is the Training and Development Manager for Motorola AirDefense Solutions, a

market leader in wireless intrusion prevention systems Shawn M Jackman, CWNE #54, CWNA,

CWSP, CWAP is a principal WLAN engineer with Kaiser Permanente He has over fi fteen years’

experience working with wireless manufacturers and integrators.

SYBEX TEST ENGINE:

Test your knowledge with advanced testing software Includes all chapter review questions and practice exams.

The focus is to educate IT professionals in the technology behind all enterprise WLAN products and to enable these profession- als to manage wireless LAN enterprise infrastructures, regardless of the vendor solution utilized CWNP is a privately held corporation based in Atlanta, Georgia For more information, visit www.cwnp.com.

www.sybex.com CATEGORY:

COMPUTERS/Certifi cation Guides

Trang 2

Free ebooks ==> www.Ebook777.com

www.Ebook777.com

Trang 3

Certified Wireless Security

Professional Official

Study Guide

Trang 5

Free ebooks ==> www.Ebook777.com

Trang 6

Acquisitions Editor: Jeff Kellum

Development Editor: Gary Schwartz

Technical Editors: Sam Coyl and Marcus Burton

Production Editor: Rachel McConlogue

Copy Editor: Liz Welch

Editorial Manager: Pete Gaughan

Production Manager: Tim Tate

Vice President and Executive Group Publisher: Richard Swadley

Vice President and Publisher: Neil Edde

Media Project Manager 1: Laura Moss-Hollister

Media Associate Producer: Marilyn Hummel

Media Quality Assurance: Josh Frank

Book Designers: Judy Fung and Bill Gibson

Proofreader: Publication Services, Inc.

Indexer: Ted Laux

Project Coordinator, Cover: Lynsey Stanford

Cover Designer: Ryan Sneed

Copyright © 2010 by Wiley Publishing, Inc., Indianapolis, Indiana

Published simultaneously in Canada

ISBN: 978-0-470-43891-6

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by

any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under

Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the

Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center,

222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600 Requests to the Publisher

for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street,

Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties

with respect to the accuracy or completeness of the contents of this work and specifically disclaim all

warran-ties, including without limitation warranties of fitness for a particular purpose No warranty may be created or

extended by sales or promotional materials The advice and strategies contained herein may not be suitable for

every situation This work is sold with the understanding that the publisher is not engaged in rendering legal,

accounting, or other professional services If professional assistance is required, the services of a competent

professional person should be sought Neither the publisher nor the author shall be liable for damages arising

here-from The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of

further information does not mean that the author or the publisher endorses the information the organization or

Web site may provide or recommendations it may make Further, readers should be aware that Internet Web sites

listed in this work may have changed or disappeared between when this work was written and when it is read.

For general information on our other products and services or to obtain technical support, please contact our

Customer Care Department within the U.S at (877) 762-2974, outside the U.S at (317) 572-3993 or fax

(317) 572-4002.

Wiley also publishes its books in a variety of electronic formats Some content that appears in print may not be

available in electronic books.

Library of Congress Cataloging-in-Publication Data

CWSP : certified wireless security professional official study guide (exam PW0-204) / David D Coleman

[et al.] — 1st ed.

p cm.

ISBN 978-0-470-43891-6

1 Wireless communication systems — Security measures — Examinations — Study guides

2 Telecommunications engineers — Certification I Coleman, David D.

TK5103.2.C87 2010

005.8076—dc22

2009042658

TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John

Wiley & Sons, Inc and/or its affiliates, in the United States and other countries, and may not be used without

written permission CWSP is a registered trademark of CWNP, Inc All other trademarks are the property of their

respective owners Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book.

10 9 8 7 6 5 4 3 2 1

Trang 7

Dear Reader,

Thank you for choosing CWSP: Certifi ed Wireless Security Professional Offi cial Study

Guide This book is part of a family of premium-quality Sybex books, all of which are

written by outstanding authors who combine practical experience with a gift for teaching

Sybex was founded in 1976 More than 30 years later, we’re still committed to producing

consistently exceptional books With each of our titles, we’re working hard to set a new

standard for the industry From the paper we print on, to the authors we work with, our

goal is to bring you the best books available

I hope you see all that refl ected in these pages I’d be very interested to hear your

comments and get your feedback on how we’re doing Feel free to let me know what you

think about this or any other Sybex book by sending me an email at nedde@wiley.com If

you think you’ve found a technical error in this book, please visit http://sybex.custhelp

.com Customer feedback is critical to our efforts at Sybex

Vice President and PublisherSybex, an Imprint of Wiley

Trang 9

We dedicate this book to all the men and women of the United States Armed Forces for putting their private lives aside to preserve and protect freedom Thank you for your service and your sacrifi ce.

Trang 10

Free ebooks ==> www.Ebook777.com

Acknowledgments

David Coleman would once again like to thank his children, Brantley and Carolina, for their

patience and understanding of their father throughout the writing of yet another book I love

you kids very much David would also like to thank his mother, Marjorie Barnes, and his

stepfather, William Barnes, for many years of support and encouragement David would also

like to thank his brother, Rob Coleman, for all his help during a tough year

David Westcott would like to thank his parents, Kathy and George, who have provided

so much support and love and from whom he has learned so much He would also like to

thank Janie, Jennifer, and Samantha for their patience and understanding of life on the

road and for their support throughout the writing of this book

Bryan Harkins would like to thank his wife, Ronda, and his two daughters, Chrystan and Catelynn, for enduring the constant travel and time away from them it has taken

to create this book I love the three of you very much I would also like to thank my

parents for always being there and my brother Chris for getting me into IT in the fi rst

place Additionally, I would like to thank David Thomas and Ralf Deltrap of Motorola

AirDefense Solutions for making me part of the AirDefense team years ago

Shawn Jackman would like to thank his parents, Alice and Steve, for the many years

of encouragement and unquestioning support, but most of all for leading by example as a

parent, provider, and character example Shawn would also like to thank his wife, Joy, the

world’s most supportive and wonderful woman a Wi-Fi geek could ever ask for And, of

course, to his children, Summer, Pierce, and Julia, who are loved by their daddy more than

they will ever know

Writing CWSP: Certifi ed Wireless Security Professional Offi cial Study Guide has been

an adventure from the start We would like to thank the following individuals for their

support and contributions during the entire process

We must fi rst thank Sybex acquisitions editor Jeff Kellum for initially fi nding us and bringing us on to this project Jeff is an extremely patient and understanding editor who

occasionally sends a nasty email message We would also like to thank our development

editor, Gary Schwartz We also need to send special thanks to our editorial manager, Pete

Gaughan; our production editor, Rachel McConlogue; and Liz Welch, our copyeditor

We also need to give a big shout-out to our technical editor, Sam Coyl Sam is a member

of the IEEE with many years of practical experience in wireless communications His

contributions to the book were nothing short of invaluable When Sam is not providing

awesome technical editing, he is vice president of business development for Netrepid

(www.netrepid.com), a wireless solutions provider

We would also like to thank Marcus Burton, Cary Chandler, Abbey Cole, and Kevin

should be proud of the internationally renowned wireless certifi cation program that sets

the education standard within the enterprise Wi-Fi industry It has been a pleasure working

with all of you the past 10 years Special thanks go to Marcus Burton for his feedback and

content review

www.Ebook777.com

Trang 11

Thanks goes to the students who attended an October 2009 CWSP evaluation class held in Atlanta Those students include Ray Baum and Max Lopez from the University of Colorado, Joe Altmann from Polycom, and Randall Bobula from the CME Group Also contributing that week was our favorite Meruvian, Diana Cortes from the University of Miami.

We would also like to thank Devin Akin, Chief Architect of Aerohive Networks Devin has been a Wi-Fi guru for all four authors for many years

Shawn would also like to thank the following co-workers and professional colleagues:

Nico Arcino, Ken Fisch, Tom Head, Jon Krabbenschmidt, and George Stefanick

We would also like to thank the following individuals and companies for their support and contributions to the book:

and Paul Levasseur

Andy Logan, Susan Wells, and Micah Wilson

and Hao Zhao

and Lori Whitmer

and Steve Rolapp

Trang 12

About the Authors

David D Coleman is a WLAN security consultant and trainer He teaches the CWNP

classes that are recognized throughout the world as the industry standard for wireless

networking certifi cation, and he also conducts vendor-specifi c Wi-Fi training He has also

taught numerous “train-the-trainer” classes and “beta” classes for the CWNP program

David has instructed IT professionals from around the globe in wireless networking

administration, wireless security, and wireless frame analysis The company he founded,

in the past with Avaya, Nortel, Polycom, and Siemens AirSpy Networks also specializes in

government classes, and it has trained numerous computer security employees from various

law enforcement agencies, the U.S Marines, the U.S Army, the U.S Navy, the U.S Air Force,

and other federal and state government agencies David has written many books and white

papers about wireless networking, and he is considered an authority on 802.11 technology

David is also a member of the Certifi ed Wireless Network Expert (CWNE) Roundtable,

a selected group of individuals who work with the CWNP program to provide direction for

the CWNP exams and certifi cations David resides in Atlanta, Georgia, where he shares a

home with his two children, Carolina and Brantley David Coleman is CWNE #4, and he

David Westcott is an independent consultant and technical trainer with over 25

years of experience in information technology, specializing in computer networking and

security In addition to providing advice and direction to corporate clients, David has

been a certifi ed trainer for over 17 years, providing training to government agencies,

corporations, and universities around the world David was an adjunct faculty member for

Boston University’s Corporate Education Center for over 10 years, and he has developed

courseware on wireless networking, wireless mesh networking, wired networking, and

security for Boston University and many other clients

Since installing his fi rst wireless network in 1999, David has become a Certifi ed Wireless Network Trainer, Administrator, Security Professional, and Analysis Professional David is

also a member of the CWNE Roundtable David has earned certifi cations from Cisco, Aruba,

Microsoft, EC-Council, CompTIA, and Novell David lives in Concord, Massachusetts with his

wife Janie and his stepdaughters, Jennifer and Samantha A licensed pilot, he enjoys fl ying his

Piper Cherokee 180 around New England when he is not fl ying around the world commercially

Trang 13

Shawn Jackman currently oversees wireless enterprise engineering for a large healthcare

provider and adopter of 802.11 technology Prior to that, Shawn has been on both sides of the table, working for a WLAN manufacturer and with wireless integrators Shawn has been intensely focused on large-scale VoWiFi, QoS, and RTLS applications for over three years, and he spends a considerable amount of his time doing end-user design, deployment, and troubleshooting for various vendors’ equipment Shawn has traveled the United States and internationally designing wired and wireless networks, from concept to completion, for healthcare, warehouse, hospitality, education, metro/municipal, government, franchise, and retail environments He has served as an on-air technical personality for a weekly syndicated call-in talk radio show with over 5 million listeners worldwide and is considered an authority on Wi-Fi technology

Shawn is a member of the CWNE Roundtable He lives in the San Francisco Bay area with his wife Joy and their three children, Summer, Pierce, and Julia Shawn is CWNE #54,

Bryan Harkins is currently the training and development manager for Motorola

AirDefense Solutions and has over 20 years experience in the IT fi eld He has been involved

in areas ranging from customer support and sales to network security and design He has developed custom curriculum for government agencies and Fortune 500 companies alike

Over the years, he has helped numerous students reach their certifi cation and knowledge goals through his exceptional skills as an instructor He delivers both public and private wireless security classes around the world and holds several prestigious industry certifi cations, including MCSE, CWNE, and CWNT

Bryan has spoken during Secure World Expo, Armed Forces Communications and Electronics Association (AFCEA) events, and Microsoft Broad Reach as well as many other industry events He holds a degree in aviation from Georgia State University Bryan

is a native of Atlanta, Georgia, and still lives in the area with his wife Ronda and two daughters, Chrystan and Catelynn Bryan is also a member of the CWNE Roundtable

Trang 15

Contents at a Glance

Introduction xxvii

Trang 17

Introduction xxvii

Summary 21

Authentication 32

Trang 18

RC4 69RC5 70DES 703DES 71AES 71

AAA 104Authentication 105Authorization 106Accounting 108802.1X 109Supplicant 110Authenticator 115

Trang 19

EAP-MD5 142EAP-LEAP 142

EAP-PEAP 146EAP-TTLS 150EAP-TLS 151EAP-FAST 153PACs 154

EAP-SIM 158EAP-AKA 158Summary 161

Trang 20

Free ebooks ==> www.Ebook777.com

RSNA 254PMKSA 254

Trang 21

Contents xix

Trang 22

xx Contents

Wireless Intrusion Detection and Prevention Systems

Cloaking 414

802.11w 415Summary 416

Trang 23

Contents xxi

Integration 480

Trang 24

Health Insurance Portability and Accountability

5 GHz UNII Point-to-Multipoint (PtMP) Communications 570

Trang 25

Contents xxiii

Windows Registry Values that Control

Trang 26

Table of Exercises

Exercise 2.1 Viewing Open System and Shared Key Authentication Frames 37

Exercise 2.2 Viewing Encrypted MSDU Payload of 802.11 Data Frames 42

Exercise 2.3 Viewing Hidden SSIDs 53

Exercise 3.1 TKIP Encrypted Frames 82

Exercise 3.2 CCMP Encrypted Frames 86

Exercise 4.1 802.1X/EAP Frame Exchanges 159

Exercise 5.1 Dynamic WEP 177

Exercise 5.2 Authentication and Key Management 193

Exercise 5.3 The 4-Way Handshake 200

Exercise 6.1 Passphrase-PSK Mapping 226

Exercise 10.1 Spectrum Analysis 402

Trang 27

Foreword

Wi-Fi is nearly ubiquitous The term Wi-Fi is certainly well known and well understood

With such widespread acceptance comes widespread usage, requiring robust security The IEEE has, as of this writing, succeeded in ratifying two major amendments to the 802.11 standard: 802.11i and 802.11n Both require major adjustments to any enterprise’s WLAN security strategy

The ratifi cation of the 802.11n amendment will likely have an even greater effect on Wi-Fi security than did the 802.11i amendment for one simple reason: 802.11n has caused many more enterprises to adopt Wi-Fi for regular, daily, and mission-critical networking applications because they now believe that wireless is about as close to wired as it can get In other words, most people think 802.11n makes wireless fast enough to use in the enterprise

That’s a great step It means that there will be even more WLAN installations in every industry—which means more people will need to know how to install, manage, and

troubleshoot these boundary-less networks More importantly, you will have to know how

to secure these networks!

With your acquisition of CWSP: Certifi ed Wireless Security Professional Offi cial

Study Guide, you have taken a huge step toward making yourself indispensible to

your organization’s wireless team Well done! Now you can start preparing to prove your knowledge of enterprise Wi-Fi security You can learn how hackers are trying to attack your wireless LAN, how to prevent them from doing so, and how to guide your organization’s policy toward large-scale deployment of enterprise Wi-Fi infrastructure and applications

The CWSP certifi cation is now the third step in the CWNP line of certifi cations and remains focused on securing an enterprise 802.11 WLAN CWSP includes topics such as 802.1X/EAP types, fast secure roaming, robust security networks, Layer 2 and

3 VPNs, wireless intrusion prevention system (WIPS) implementation, intrusion and attack techniques, and much more Additional CWNP certifi cations focus more intensely

on protocol analysis, quality of service, design, advanced surveying, VoWiFi, location tracking, and RF spectrum management

David Coleman (CWNE #4) and David Westcott (CWNE #4) have worked as Certifi ed Wireless Network Trainers (CWNTs) for as long as the CWNT certifi cation has been available, and each was quick to pursue all CWNP certifi cations as they were released

Each has years of experience with a breadth of WLAN technologies and leading-edge products, which is obvious to their students and anyone working alongside them in the

fi eld Having worked with each of these gentlemen for years, I can confi dently say there could be no fi ner pair of seasoned trainers collaborating on a CWSP book

The addition of Shawn Jackman (CWNE #54) and Bryan Harkins (CWNE #44) brings

to the book a wealth of fi eld experience from the WLAN security and healthcare markets

Jackman leads the WLAN team at a major healthcare organization and Harkins is the lead

Trang 28

technical instructor for Motorola’s AirDefense unit These WLAN veterans have devoted

hundreds of hours to pouring their experience into this book, and the reader is certain to

acquire a plethora of 802.11 knowledge Coleman, Harkins, Jackman, and Westcott have

played a big role in the shaping of CWNP and have each added tremendous value to the

CWNA and CWSP certifi cations specifi cally

We thank each of these fi ne authors for their constant support of CWNP, and congratulate them on the completion of their second Study Guide

Kevin SandlinCo-founder and CEOCWNP Inc

Trang 29

Introduction

If you have purchased this book or if you are even thinking about purchasing this book,

Profes-sional) certifi cation exam or in learning what the CWSP certifi cation exam is about The authors would like to congratulate you on this fi rst step, and we hope that our book can help you on your journey Wireless local area networking (WLAN) is currently one of the hottest technologies on the market Security is an important and mandatory aspect

of 802.11 wireless technology As with many fast - growing technologies, the demand for knowledgeable people is often greater than the supply The CWSP certifi cation is one way

to prove that you have the knowledge and skills to secure 802.11 wireless networks fully This study guide is written with that goal in mind

This book is designed to teach you about WLAN security so that you have the knowledge needed not only to pass the CWSP certifi cation test, but also to be able to design, install, and support wireless networks We have included review questions at the end of each chapter to help you test your knowledge and prepare for the exam We have also included labs, white papers, and presentations on the CD to facilitate your learning further

Before we tell you about the certifi cation process and its requirements, we must mention that this information may have changed by the time you are taking your test We

the current objectives and requirements

Do not just study the questions and answers! The practice questions in this book are designed to test your knowledge of a concept or objective that

is likely to be on the CWSP exam The practice questions will be different from the actual exam questions If you learn and understand the topics and objectives in this book, you will be better prepared for the test

About CWSP ® and CWNP ®

If you have ever prepared to take a certifi cation test for a technology with which you are unfamiliar, you know that you are not only studying to learn a different technology, but you are also probably learning about an industry with which you are unfamiliar Read on

and we will tell you about the CWNP Program CWNP is an abbreviation for Certifi ed

Wireless Network Professional There is no CWNP test The CWNP Program develops

courseware and certifi cation exams for wireless LAN technologies in the computer working industry The CWNP certifi cation program is a vendor - neutral program

The objective of the CWNP Program is to certify people on wireless networking, not on

a specifi c vendor ’ s product Yes, at times the authors of this book and the creators of the certifi cation will talk about, or even demonstrate how to use a specifi c product; however,

Trang 30

xxviii Introduction

the goal is the overall understanding of wireless technology, not the product itself If you

learned to drive a car, you physically had to sit and practice in one When you think back

and reminisce, you probably do not tell anyone that you learned to drive a Ford; you

probably say you learned to drive using a Ford

There are fi ve wireless certifi cations offered by the CWNP Program:

CWTS ™ : Certified Wireless Technology Specialist The CWTS certifi cation is the

latest certifi cation from the CWNP Program CWTS is an entry - level enterprise

WLAN certifi cation, and it is a recommended prerequisite for the CWNA certifi cation

This certifi cation is geared specifi cally toward both WLAN sales and support staff for

the enterprise WLAN industry The CWTS certifi cation exam (PW0 - 070) verifi es that

sales and support staffs are specialists in WLAN technology and have all the fundamental

knowledge, tools, and terminology to sell and support WLAN technologies more

effectively

CWNA ® : Certified Wireless Network Administrator The CWNA certifi cation is

a foundation - level Wi - Fi certifi cation; however, it is not considered an “ entry - level ”

technology certifi cation Individuals taking the CWNA exam (PW0 - 104) typically have

a solid grasp of network basics such as the OSI model, IP addressing, PC hardware, and

network operating systems Many candidates already hold other industry - recognized

certifi cations, such as CompTIA Network+ or Cisco CCNA, and are looking to the CWNA

certifi cation to enhance or complement existing skills

CWSP ® : Certified Wireless Security Professional The CWSP certifi cation exam

(PW0 - 204) is focused on standards - based wireless security protocols, security policy,

and secure wireless network design This certifi cation introduces candidates to many of

the technologies and techniques that intruders use to compromise wireless networks and

administrators use to protect wireless networks With recent advances in wireless security,

WLANs can be secured beyond their wired counterparts

CWNE ® : Certified Wireless Network Expert The CWNE certifi cation (PW0 - 300) is the

highest - level certifi cation in the CWNP Program By successfully completing the CWNE

requirements, you will have demonstrated that you have the most advanced skills available

in today ’ s wireless LAN market The CWNE exam (PW0 - 300) focuses on advanced

WLAN analysis, design, troubleshooting, quality of service (QoS) mechanisms, spectrum

management, and extensive knowledge of the IEEE 802.11 standard as amended

CWNT ® : Certified Wireless Network Trainer Certifi ed Wireless Network Trainers are

qualifi ed instructors certifi ed by the CWNP Program to deliver CWNP training courses to

IT professionals CWNTs are technical and instructional experts in wireless technologies,

products, and solutions To ensure a superior learning experience for our customers,

CWNP Education Partners are required to use CWNTs when delivering training using

Offi cial CWNP Courseware

Trang 31

Introduction xxix

How to Become a CWSP

To become a CWSP, you must do the following three things:

Confidentiality Agreement

The CWNA certifi cation is a prerequisite for the CWSP certifi cation If you have purchased this book, there is a good chance that you have already passed the CWNA exam and are now ready to move to the next level of certifi cation and plan to study and pass the CWSP exam That is the usual recommended path to achieving CWSP certifi cation;

however, there is no requirement to take the exams in order You can take the CWSP exam prior to passing the CWNA exam, but you will not become a certifi ed CWSP until you have passed both exams

A copy of the CWNP Confidentiality Agreement can be found online at the CWNP website

When you sit to take any CWNP exam, you will be required to accept this confi dentiality agreement before you can continue with the exam Once you have agreed, you will be able to continue

The information for the CWNA exam is as follows:

The information for the CWSP exam is as follows:

Trang 32

xxx Introduction

When you schedule the exam, you will receive instructions regarding appointment and cancellation procedures, ID requirements, and information about the testing center

location In addition, you will receive a registration and payment confi rmation letter

Exams can be scheduled weeks in advance or, in some cases, even as late as the same day

After you have successfully completed the CWSP certifi cation requirements, the CWNP Program will award you the CWSP certifi cation that is good for three years To recertify,

you will need to pass the current PW0 - 204 exam, or earn the CWNE certifi cation If the

information you provided the testing center is correct, you will receive an e - mail from

CWNP recognizing your accomplishment and providing you with a CWNP certifi cation

number After you earn any CWNP certifi cation, you can request a certifi cation kit The

kit includes a congratulatory letter, a certifi cate, and a wallet - sized personalized ID card

You will need to log in to the CWNP tracking system, verify your contact information, and

request your certifi cation kit

Who Should Buy this Book?

If you want to acquire a solid foundation in WLAN security and your goal is to prepare for

the exam, this book is for you You will fi nd clear explanations of the concepts you need to

grasp and plenty of help to achieve the high level of professional competency you need in

order to succeed

If you want to become certifi ed as a CWSP, this book is defi nitely what you need

However, if you just want to attempt to pass the exam without really understanding

WLAN security, this study guide is not for you It is written for people who want to

acquire hands - on skills and in - depth knowledge of wireless networking security

How to Use this Book and the CD

We have included several testing features in the book and on the CD - ROM These tools

will help you retain vital exam content as well as prepare you to sit for the actual exam:

Before You Begin At the beginning of the book (right after this introduction) is an

assessment test you can use to check your readiness for the exam Take this test before you

start reading the book; it will help you determine the areas in which you may need to brush

up The answers to the assessment test appear on a separate page after the last question

of the test Each answer includes an explanation and a note telling you the chapter in which

the material appears

Trang 33

Introduction xxxi

Chapter Review Questions To test your knowledge as you progress through the book,

there are review questions at the end of each chapter As you fi nish each chapter, answer the review questions and then check your answers ; the correct answers appear on the page following the last review question You can go back and reread the section that deals with each question you answered wrong to ensure that you answer correctly the next time you are tested on the material

Electronic Flashcards You will fi nd fl ashcard questions on the CD for on - the - go review

These are short questions and answers, just like the fl ashcards you probably used in school

You can answer them on your PC or download them onto a handheld device for quick and convenient reviewing

Test Engine The CD also contains the Sybex Test Engine With this custom test engine,

you can identify weak areas up front and then develop a solid studying strategy that includes each of the robust testing features described previously Our thorough readme fi le will walk you through the quick, easy installation process

In addition to the assessment test and the chapter review questions, you will fi nd two bonus exams Use the test engine (without any reference material) to take these practice exams just as if you were taking the actual exam When you have fi nished the fi rst exam, move

on to the next one to solidify your test - taking skills If you get more than 95 percent of the answers correct, you are ready to take the certifi cation exam

Hands - on Exercises Several chapters in this book have exercises that use software

and videos that are also provided on the CD - ROM that is included with this book

These hands - on exercises will provide you with a broader learning experience by providing hands - on experience and step - by - step problem solving

White Papers Several chapters in this book will reference WLAN security white papers

that are also provided on the CD - ROM that is included with this book These white papers serve as additional reference material for preparing for the CWSP exam

Exam Objectives

The CWSP exam measures your understanding of the fundamentals of WLAN security

as well as 802.11 and 802.1X/EAP security protocols The CWSP exam also tests your knowledge of the skills needed to install, confi gure, and troubleshoot WLAN security architecture

The skills and knowledge measured by this examination were derived from a survey

of wireless networking experts and professionals The results of this survey were used in weighing the subject areas and ensuring that the weighting is representative of the relative importance of the content

Trang 34

xxxii Introduction

The following chart provides the breakdown of the exam, showing you the weight of each section:

Wireless LAN Security Subject Area % of Exam

Wireless Network Attacks and Threat Assessment 10%

Wireless Network Attacks and Threat Assessment — 10%

1.1 Demonstrate How to Recognize, Perform, and Prevent the Following

Types of Attacks, and Discuss Their Impact on the Organization

■ Man - in - the - middle

1.2 Understand the Probability of, Demonstrate the Methodology of, and

Execute the Preventative Measures Against the Following Attacks on Wireless

Infrastructure Devices

Trang 35

Free ebooks ==> www.Ebook777.com

Introduction xxxiii

1.3 Explain and Demonstrate the Use of Protocol Analyzers

to Capture the Following Sensitive Information

■ Peer - to - peer attack

Monitoring, Management, and Tracking — 20%

2.1 Understand How to Use Laptop - Based Protocol and Spectrum Analyzers

to Effectively Troubleshoot and Secure Wireless Networks 2.2 Describe the Use, Configuration, and Components of an 802.11 Wireless Intrusion Prevention Systems ( WIPS )

Trang 36

xxxiv Introduction

2.3 Explain 802.11 WIPS Baselining and Demonstrate the Following Tasks

autho-rized, external, or rogue

2.4 Describe and Understand Common Security Features of 802.11 WIPS

tech-niques for real - time device and interference tracking

■ Data forensics

2.5 Describe and Demonstrate the Different Types of WLAN Management

Systems and Their Features

Trang 37

Security Design and Architecture — 50%

3.1 Describe Wireless Network Security Models

3.2 Recognize and Understand the Following Security Concepts:

and technology

3.3 Identify the Purpose and Characteristics of 802.1X and EAP

Trang 38

xxxvi Introduction

■ Wireless client utility software

3.6 Describe and Demonstrate the Use of Secure Infrastructure

3.7 Explain the Role, Importance, and Limiting Factors of VLAN s and Network

Segmentation in an 802.11 WLAN Infrastructure

3.8 Describe, Configure, and Deploy an AAA Server and Explain the Following

Concepts Related to AAA Servers

Trang 39

Introduction xxxvii

Pro-tected Access Credentials [PACs] & Biometrics)

3.9 Explain Frame Exchange Processes and the Purpose of Each Encryption Key within 802.11 Authentication and Key Management

3.10 Describe and Configure Major Security Features

in WLAN Infrastructure Devices

3.11 Explain the Benefits of and Configure Management Frame Protection (802.11w) in Access Points and WLAN Controllers

3.12 Explain the Purpose, Methodology, Features, and Configuration of Guest Access Networks

■ User - based authentication methods

Trang 40

Free ebooks ==> www.Ebook777.com

4.2 Describe Appropriate Installation Locations for and Remote Connectivity

to WLAN Devices in Order to Avoid Physical Theft, Tampering, and Data Theft

4.3 Explain the Importance and Implementation

of Client - Side Security Applications

4.4 Explain the Importance of On - Going WLAN Monitoring

and Documentation

4.5 Summarize the Security Policy Criteria Related to Wireless

Public Access Network Use

www.Ebook777.com

Ngày đăng: 04/03/2019, 08:21

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

w