Wireless Network Security: A Beginner's Guide
- Tyler Wrightson
Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included.
This practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. You'll learn how to securely deploy WPA2 wireless networks, including WPA2-Enterprise using digital certificates for authentication. The book provides techniques for dealing with wireless guest access and rogue access points. Next-generation wireless networking technologies, such as lightweight access points and cloud-based wireless solutions, are also discussed. Templates, checklists, and examples give you the hands-on help you need to get started right away.
Wireless Network Security: A Beginner's Guide features:
- Lingo--Common security terms defined so that you’re in the know on the job
- IMHO--Frank and relevant opinions based on the author's years of industry experience
- In Actual Practice--Exceptions to the rules of security explained in real-world contexts
- Your Plan--Customizable checklists you can use on the job now
- Into Action--Tips on how, why, and when to apply new skills and techniques at work
About the Author
Tyler Wrightson, CISSP, CCSP, CCNA, CCDA, MCSE, is the founder and president of Leet Systems, a next-generation security service provider, and Frigdo.com, a free online events search engine. He is currently a senior security consultant for Integralis, Inc., where he specializes in offensive security engagements and penetration testing.
In this Book
Introduction to the Wireless Security Mindset
Wireless Tools and Gadgets
Theory of Attacks on Wireless Networks
Attacking Wireless Networks
Attacking Wireless Clients
Theory of Defense for Securing Wireless Networks
Understanding the WPA2-Enterprise with Certificates Architecture
Deploying a WPA-Enterprise Network with Certificates
Deploying Secure Wireless Networks
Handling Wireless Guest Access
Handling Rogue Access Points and the Future of Wireless Security