CWSP objectives in the book & on the site
Last Post: October 3, 2008:
-
OK, seriously I'm not happy. I was glancing at the objectives of the CWSP Official Study Guide, and I'm coming out with a number of discrepancies. I'm quite aware the book went to press late in 2006 and the PWO-200 exam was reviewed in April of 2007, but I'm still unhappy! Please could someone help point out where I could do the extra reading to cover up the areas I've highlighted below that aren't part of the Objectives in the book but are the current PWO-200 exam objectives -
2.3 Explain and demonstrate the use of protocol analysis to capture the following sensitive information:
.../ X.509 certificates
4.1 Describe wireless network security models
Hotspot / Public Access
Small Office / Home Office
Small and Medium Business
Enterprise
4.2 Recognize and understand the following basic security concepts:
...Appropriate use and configuration of Wi-Fi Protected Setup (WPS)
...Feasibility of WPA-Personal, WPA2-Personal, and WPS exploitation
...Appropriate use and configuration of WPA2-Personal and WPA2-Enterprise
4.5 Compare advantages and disadvantages of VPN technology and 802.1X/EAP types in 802.11 WLANs:
...Levels of security
4.11 Describe and demonstrate the following types of authentication servers and user databases used with 802.11 WLANs:
WPS Registrar (external and integrated)
4.15 Explain Wi-Fi Protected Setup (WPS) Authentication and Key Management, including:
WPS components, architecture, and state machines
WPS Registration Protocol
External Registrar setup (over Ethernet and Wi-Fi)
Enrollee setup (using Standalone AP/Registrar and External Registrar)
EAP-WSC and EAP message framing
WPS WLAN Managers
Required and recommended security practices
In-band and out-of-band authentication methods
4.24 Describe secure wVoIP implementations
Choosing an AKM scheme that allows fast/secure roaming
Choosing an AKM scheme that is appropriately scalable
Implementing Wi-Fi Protected Setup with wVoIP
4.23 Explain the impact of L2, L3, and L7 security protocols on client roaming.
5.6 Explain the importance and implementation of client-side security applications:
802.1X/EAP supplicant software
- 1