Comptia Security+ SY0-501

Comptia Security+ SY0-501

CompTIA Security+ 501 CompTIA Security+ SY0-501 Instructor: Ron Woerner, CISSP, CISM CompTIA Security+ Domain 6 – Cryptography & PKI 6.3 Given a scenario, install and configure wireless security settings Cybrary - Ron Woerner 1 CompTIA Security+ 501 6.3 Wireless Security ● Methods ● Authentication protocols ○ PSK vs. Enterprise vs. ○ EAP Open ○ PEAP ○ WPS ○ EAP-FAST ○ Captive portals ○ EAP-TLS ● Cryptographic protocols ○ EAP-TTLS ○ IEEE 802.1x ○ WPA ○ RADIUS Federation ○ WPA2 ○ CCMP ○ TKIP Wireless Access Methods ● Open authentication – only need to know the network name / SSID ○ Captive portal - web page that is launched first when connecting through a network ● Shared Authentication ○ The client and the wireless access point must negotiate and share a key prior to initiating communications ○ Pre-shared key (PSK) . Each user uses the same key to connect to the wi-fi network. ● Enterprise ○ A server handles distribution of cryptographic keys and/or digital certificates ○ Extensible Authentication Protocol (EAP) Cybrary - Ron Woerner 2 CompTIA Security+ 501 Wi-Fi protected setup (WPS) ● Standard to simplify Wireless Access Point (AP) set-up for home users Three modes: ● PIN entry ● Push-button configuration (PBC) ● Near Field Communication (NFC) Wireless Cryptographic protocols ● Wired Equivalent Privacy (WEP) : This original wireless encryption standard should not be used today ● Wi-Fi Protected Access (WPA) : WPA was developed in response to security concerns over WEP ● Wi-Fi Protected Access Version 2 (WPA2) ○ Required for Wi-Fi certified devices ○ Uses AES for encryption ○ Based on the IEEE 802.11i standard Cybrary - Ron Woerner 3 CompTIA Security+ 501 Wi-Fi Protected Access ● WPA-Personal (WPA-PSK) ○ Uses a pre-shared key to authenticate and validate users on a wireless LAN (WLAN) or Wi-Fi connection ● WPA-Enterprise (WPA-802.1X) ○ Increased security for larger organizations ○ Requires RADIUS authentication server ● Temporal Key Integrity Protocol (TKIP) ○ Based on RC4 ○ Uses a unique key with each packet ○ Considered depreciated Wi-Fi Protected Access 2 (WPA2) ● Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) ○ Replaced TKIP ○ Based on AES encryption cipher ○ CCM combines CTR for confidentiality and CBC-MAC for authentication and integrity ● Fully implements the IEEE 802.11i-2004 Wi-Fi security standards Cybrary - Ron Woerner 4 CompTIA Security+ 501 Authentication protocols ● EAP ○ Requires an authentication server ○ Allows authentication methods beyond username/password ○ Provides support for public certificates ○ Four modes ■ PEAP – Protected EAP ■ EAP-TLS – EAP-Transport Layer Security ■ EAP-TTLS – EAP Tunneled Transport Layer Security ■ EAP-FAST – EAP Flexible Authentication via Secure Tunneling Extensible Authentication Protocol (EAP) ● PEAP ● EAP-FAST ● EAP-TLS ● EAP-TTLS Cybrary - Ron Woerner 5 CompTIA Security+ 501 Authentication protocols ● IEEE 802.1x ○ The IEEE standard for port-based network access control. ● RADIUS Federation ○ Using RADIUS to authenticate between entities. ○ As part of PEAP negotiation, client establishes a TLS session with a RADIUS server ○ Client authenticates with RADIUS server Exam Preparation Also known as WPA-Personal, this is a security mechanism used to authenticate and validate users on a wireless LAN (WLAN) or Wi-Fi connection? A. WPA-PSK B. PEAP C. WPA-TKIP D. WPA-CCMP Cybrary - Ron Woerner 6 CompTIA Security+ 501 Exam Preparation This network authentication protocol uses digital certificate-based mutual authentication, which occurs automatically with no intervention by the user. A. PEAP B. EAP-FAST C. EAP-TLS D. EAP-TTLS CompTIA Security+ Domain 6 – Cryptography & PKI 6.3 Given a scenario, install and configure wireless security settings Cybrary - Ron Woerner 7.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    7 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us