About the Book
The book covers all the exam objectives for the latest version of the CWSP. The book includes in-depth coverage of the exam objectives, as well as hands-on exercises, chapter review questions, a detailed glossary, and a pre-assessment test. The CD includes two bonus exams and over 150 flashcards.
About the Author
David Coleman, CWNA, CWSP, CWNT, is an independent consultant and technical trainer with over fifteen years of IT experience. David is Certified Wireless Network Trainer, Administrator, Security Professional, and Analysis Professional and also holds Microsoft and Cisco certifications. David has consulted with CWNP on the certification program providing beta testing of classroom hands-on labs for the courseware used in the wireless certification programs. He has also taught numerous "train the trainer" classes and "beta" classes for the CWNP wireless program.
David Westcott, CWNA, CWSP, and CWNT, is an independent consultant and technical trainer with over twenty years of experience. David has been a certified trainer for over 12 years, providing training to government agencies, corporations, and universities.
Bryan Harkins, CWNA, CWSP, and CWNE is the Training and Development Manager for Motorola AirDefense Solutions, the market leader in Wireless Intrusion Prevention Systems.
Shawn Jackman, CWNE is a lead WLAN engineer for one of the largest US hospital systems and has over 15 years experience in information technology. Shawn has worked internationally at both a wireless manufacturer and at wireless integrators deploying almost every type of major wireless application. He holds several wired and wireless vendor certifications.
Table of Contents: · Wireless Security Basics.
· Legacy 802.11 Security.
· Encryption Ciphers and Methods.
· Enterprise 802.11 Layer 2 Authentication Methods.
· 802.11 Dynamic Encryption Key Generation.
· SOHO 802.11 Security.
· 802.11 Fast Secure Roaming.
· Wireless Security Risks.
· Wireless LAN Security Auditing.
· Wireless Security Monitoring.
· VPNs, Remote Access, and Guest Access Services.
· Wireless Security Infrastructure.
· Wireless Security Policies.