did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780470438916

CWSP Certified Wireless Security Professional Official Study Guide Exam PW0-204

by ; ; ;
  • ISBN13:

    9780470438916

  • ISBN10:

    0470438916

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2010-02-15
  • Publisher: Sybex
  • Purchase Benefits
List Price: $69.99

Summary

Sybex is now the official publisher for Certified Wireless Network Professional, the certifying vendor for the CWSP program. This guide covers all exam objectives, including WLAN discovery techniques, intrusion and attack techniques, 802.11 protocol analysis. Wireless intrusion-prevention systems implementation, layer 2 and 3 VPNs used over 802.11 networks, and managed endpoint security systems. It also covers enterprise/SMB/SOHO/Public-Network Security design models and security solution implementation, building robust security networks, wireless LAN management systems, and much more.Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Author Biography

David D. Coleman, CWNE #4, CWNA, CWSP, CWNT, is a WLAN security consultant and technical trainer with over twenty years of IT experience. The company he founded, AirSpy Networks (www.airspy.com), specializes in corporate WLAN training.

David A. Westcott, CWNE #7, CWNA, CWSP, CWNT, is an independent consultant and WLAN technical trainer with over twenty years ofexperience. He has been a certified trainer for over fifteen years.

Bryan E. Harkins, CWNE #44, CWSP,CWNA, CWNT, is the Training and Development Manager for Motorola AirDefense Solutions, a market leader in wireless intrusion prevention systems.

Shawn M. Jackman, CWNE #54, CWNA, CWSP, CWAP is a principal WLAN engineer with Kaiser Permanente. He has over fifteen years' experience working with wireless manufacturers and integrators.

Table of Contents

Wireless Security Basics
Legacy 802.11 Security
Encryption Ciphers and Methods
Enterprise 802.11 Layer 2 Authentication Methods
802.11 Dynamic Encryption Key Generation
SOHO 802.11 Security
802.11 Fast Secure Roaming
Wireless Security Risks
Wireless LAN Security Auditing
Wireless Security Monitoring
VPNs, Remote Access, and Guest Access Services
Wireless Security Infrastructure
Wireless Security Policies
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program