Wireless Network Security: A Beginner's Guide

  • 5h
  • Tyler Wrightson
  • McGraw-Hill/Osborne
  • 2012

Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included.

This practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. You'll learn how to securely deploy WPA2 wireless networks, including WPA2-Enterprise using digital certificates for authentication. The book provides techniques for dealing with wireless guest access and rogue access points. Next-generation wireless networking technologies, such as lightweight access points and cloud-based wireless solutions, are also discussed. Templates, checklists, and examples give you the hands-on help you need to get started right away.

Wireless Network Security: A Beginner's Guide features:

  • Lingo--Common security terms defined so that you’re in the know on the job
  • IMHO--Frank and relevant opinions based on the author's years of industry experience
  • In Actual Practice--Exceptions to the rules of security explained in real-world contexts
  • Your Plan--Customizable checklists you can use on the job now
  • Into Action--Tips on how, why, and when to apply new skills and techniques at work

About the Author

Tyler Wrightson, CISSP, CCSP, CCNA, CCDA, MCSE, is the founder and president of Leet Systems, a next-generation security service provider, and Frigdo.com, a free online events search engine. He is currently a senior security consultant for Integralis, Inc., where he specializes in offensive security engagements and penetration testing.

In this Book

  • Introduction to the Wireless Security Mindset
  • Wireless Tools and Gadgets
  • Theory of Attacks on Wireless Networks
  • Attacking Wireless Networks
  • Attacking Wireless Clients
  • Theory of Defense for Securing Wireless Networks
  • Understanding the WPA2-Enterprise with Certificates Architecture
  • Deploying a WPA-Enterprise Network with Certificates
  • Deploying Secure Wireless Networks
  • Handling Wireless Guest Access
  • Handling Rogue Access Points and the Future of Wireless Security