Forum

  • OK, seriously I'm not happy. I was glancing at the objectives of the CWSP Official Study Guide, and I'm coming out with a number of discrepancies. I'm quite aware the book went to press late in 2006 and the PWO-200 exam was reviewed in April of 2007, but I'm still unhappy! Please could someone help point out where I could do the extra reading to cover up the areas I've highlighted below that aren't part of the Objectives in the book but are the current PWO-200 exam objectives -

    2.3 Explain and demonstrate the use of protocol analysis to capture the following sensitive information:
    .../ X.509 certificates

    4.1 Describe wireless network security models
    Hotspot / Public Access
    Small Office / Home Office
    Small and Medium Business
    Enterprise

    4.2 Recognize and understand the following basic security concepts:
    ...Appropriate use and configuration of Wi-Fi Protected Setup (WPS)
    ...Feasibility of WPA-Personal, WPA2-Personal, and WPS exploitation
    ...Appropriate use and configuration of WPA2-Personal and WPA2-Enterprise
    4.5 Compare advantages and disadvantages of VPN technology and 802.1X/EAP types in 802.11 WLANs:
    ...Levels of security
    4.11 Describe and demonstrate the following types of authentication servers and user databases used with 802.11 WLANs:
    WPS Registrar (external and integrated)
    4.15 Explain Wi-Fi Protected Setup (WPS) Authentication and Key Management, including:
    WPS components, architecture, and state machines
    WPS Registration Protocol
    External Registrar setup (over Ethernet and Wi-Fi)
    Enrollee setup (using Standalone AP/Registrar and External Registrar)
    EAP-WSC and EAP message framing
    WPS WLAN Managers
    Required and recommended security practices
    In-band and out-of-band authentication methods

    4.24 Describe secure wVoIP implementations
    Choosing an AKM scheme that allows fast/secure roaming
    Choosing an AKM scheme that is appropriately scalable
    Implementing Wi-Fi Protected Setup with wVoIP

    4.23 Explain the impact of L2, L3, and L7 security protocols on client roaming.

    5.6 Explain the importance and implementation of client-side security applications:
    802.1X/EAP supplicant software

Page 1 of 1
  • 1