Here is the study plan for August. You can watch my progress as the days go by. The Red days indicates days when I did not study at all. Let’s face it, we are all human and we have a tendency of being lazy :). Yellow is for days when I did actually study but did … Continue reading August 2015 Study Plan
Tag: CWSP
July 2015 Study Plan
It is day one of the month, hence the best time to plan my study hours. Here is the study plan for July. You can watch my progress as the days go by. The Red days indicates days when I did not study at all. Let’s face it, we are all human and we have … Continue reading July 2015 Study Plan
Half way through 2015
We are half way through the year but It feels like the year has just begun. The plans remain unaccomplished, the dreams get bigger by the day but reality is a sad little story :). When I think that am a tad wiser, I get slapped back and realize that am actually stupidier than I thought … Continue reading Half way through 2015
Capturing WLAN Packets using WireShark
If you are studying for CCNP Wireless or CWNP Certification, an essential part of the study process is actually getting to lab it all out so as to understand the concepts. I noticed that my Wireshark output lacked the 802.11 management or control packets while trying to capture Open System Authentication process. This blog will explain … Continue reading Capturing WLAN Packets using WireShark
June 2015 Study Plan
This study plan was inspired by Rasika. Check out his blog. Very informative. The Red days indicates days when I did not study at all. Let's face it, we are all human and we have a tendency of being lazy :). Yellow is for days when I did actually study but did not meet the planned number … Continue reading June 2015 Study Plan
CWNP’s CWSP-205 Official Study Guide Book Review | Part 1
When I think of the CWNP Program, I think of actual Wireless knowledge that Vendor oriented programs have failed to deliver. I have always used CWNP books to complement information that was missing during my past CCNP Wireless exams (2 more to go). It was therefore only logical that I would turn to their CWSP book … Continue reading CWNP’s CWSP-205 Official Study Guide Book Review | Part 1
CWNA Summary Notes: Legacy 802.11 Security | Legacy Authentication
Legacy Authentication Legacy authentication methods were more of an authentication of capability (verification between two devices that they were valid 802.11 devices) and not so much an authentication of user identity. They are of two types: Open System Authentication It provides authentication without performing any form of user verification Involved a 2 way exchange between … Continue reading CWNA Summary Notes: Legacy 802.11 Security | Legacy Authentication
CWNA Summary Notes: 802.11 Network Security Architecture
Components of a Secure Network Required components when securing a network are: Data Privacy and Integrity Access to Wireless medium is unrestricted hence the use of cipher encryption technologies is needed for proper data privacy. A cipher is an algorithm that is used to perform encryption: RC4 algorithm ( Ron's Code / Rivest Cipher) It encrypts … Continue reading CWNA Summary Notes: 802.11 Network Security Architecture