Chapter 1 WLAN Security Overview
International Organization for Standardization (ISO)
Institute of Electrical and Electronics Engineers (IEEE)
Internet Engineering Task Force (IETF)
Authentication, Authorization, Accounting (AAA)
802.11i Security Amendment and WPA Certifications
Chapter 2 Legacy 802.11 Security
Wired Equivalent Privacy (WEP) Encryption
Virtual Private Networks (VPNs)
Point-to-Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
Internet Protocol Security (IPsec)
Chapter 3 Encryption Ciphers and Methods
Symmetric and Asymmetric Algorithms
Proprietary Layer 2 Implementations
Chapter 4 802.1X/EAP Authentication
Protected Access Credentials (PACs)
Server Certificates and Root CA Certificates
Legacy Authentication Protocols
Chapter 5 802.11 Layer 2 Dynamic Encryption Key Generation
Advantages of Dynamic Encryption
Authentication and Key Management (AKM)
Preshared Keys (PSK) and Passphrases
Simultaneous Authentication of Equals (SAE)
Chapter 7 802.11 Fast Secure Roaming
Opportunistic Key Caching (OKC)
FT Initial Mobility Domain Association
Over-the-Air Fast BSS Transition
Over-the-DS Fast BSS Transition
Chapter 8 WLAN Security Infrastructure
Management, Control, and Data Planes
Centralized Network Management Systems
Authentication and Authorization
WLAN Devices as RADIUS Servers
Captive Web Portal and MAC Authentication
Chapter 10 Bring Your Own Device (BYOD) and Guest Access
Company-Issued Devices vs. Personal Devices
Self-Service Device Onboarding for Employees
MDM vs. Self-Service Onboarding
Client Isolation, Rate Limiting, and Web Content Filtering
RADIUS Change of Authorization
Chapter 11 Wireless Security Troubleshooting
Five Tenets of WLAN Troubleshooting
Troubleshooting Best Practices
Most Wi-Fi Problems Are Client Issues
Proper WLAN Design Reduces Problems
802.1X/EAP Troubleshooting Zones
Zone 1: Backend Communication Problems
Zone 2: Supplicant Certificate Problems
Zone 2: Supplicant Credential Problems
Chapter 12 Wireless Security Risks
Guest Access and WLAN Hotspots
Chapter 13 Wireless LAN Security Auditing
Chapter 14 Wireless Security Monitoring
Wireless Intrusion Detection and Prevention Systems (WIDS and WIPS)
WIDS/WIPS Infrastructure Components
Chapter 15 Wireless Security Policies
Authentication and Encryption Policy
Government and Industry Regulations
The U.S. Department of Defense (DoD) Directive 8420.1
Federal Information Processing Standards (FIPS) 140-2
The Sarbanes-Oxley Act of 2002 (SOX)
Graham-Leach-Bliley Act (GLBA)
Health Insurance Portability and Accountability Act (HIPAA)
Payment Card Industry (PCI) Standard
802.11 WLAN Policy Recommendations
Appendix A Answers to Review Questions
Chapter 1: WLAN Security Overview
Chapter 2: Legacy 802.11 Security
Chapter 3: Encryption Ciphers and Methods
Chapter 4: 802.1X/EAP Authentication
Chapter 5: 802.11 Layer 2 Dynamic Encryption Key Generation
Chapter 7: 802.11 Fast Secure Roaming
Chapter 8: WLAN Security Infrastructure
Chapter 10: Bring Your Own Device (BYOD) and Guest Access
Chapter 11: Wireless Security Troubleshooting
Chapter 12: Wireless Security Risks
Chapter 13: Wireless LAN Security Auditing
Chapter 14: Wireless Security Monitoring
Chapter 15: Wireless Security Policies
18.221.89.183