CWNP CWSP – Module 03 – Encryption Ciphers and Methods Part 6

Proprietary Solutions And finally, I’m not going to talk much more about this there are proprietary solutions. Many vendors have created their own types of solutions. Like one called X SEC, which is a vendor specific wired wireless security solution. Something used by a very good wireless company, Aruba and Funk. It used a 256 bit encryption. The problem is, you had to use all Aruba equipment to make that that happen. Fortress was another example of proprietary client software used for secure solutions, which means you’d have to install…

CWNP CWSP – Module 03 – Encryption Ciphers and Methods Part 5

CCMP Part4 Now from there, that random number announced is going to be created from the packet number, the transmitter address and the priority data using QoS. And from then, the eight octet CCMP header is going to be constructed. So that’s going to have the key ID, the packet number, as we said, which will be divided into six different octets. And you’ll notice it says here that the construction of the header is basically identity identical to that header that we saw in the temporal key header. From…

CWNP CWSP – Module 03 – Encryption Ciphers and Methods Part 4

CCMP Part1 CCMP is where we’re moving to. It’s often associated with the advanced Encryption standard AES we call it, as you see here, the counter mode with cipher block chaining message authentication code protocol. So somehow they left out a bunch of the letters to come up with that acronym, CCMP. This is a part of the 8211 series that was designed for security. As part of the amendment. It was designed here. It is here as a replacement not only to TKIP but certainly to Web. And it…

CWNP CWSP – Module 03 – Encryption Ciphers and Methods Part 3

TKIP Part2 Alright, so a little bit more about the countermeasures with TKIP. So we already start off by talking about it’s using a very long key, 128 bit temporal key that comes from a four way handshake. And we’re going to see this four way handshake, four way handshake coming up over and over again as we get further into this encryption process. So don’t worry about that at this particular point. But the idea is like, like I said, with that is having those dynamic keys being created…

CWNP CWSP – Module 03 – Encryption Ciphers and Methods Part 2

WLAN Encryption Methods Now let’s take this into the world of the wireless local area network, the WLAN. So remember that 800 and 211 is defined really for layer two of the OSI model. And so what we’re seeing here is that we’re still going to go through a lot of encryption. Not once did I say anything about having to have an IP address. I really didn’t, because we’re really talking right now about encryption between that laptop and its connection to our wireless access point. Here, I’ll put…

CWNP CWSP – Module 03 – Encryption Ciphers and Methods

Encryption Ciphers and Methods Now in this module, we’re going to talk a lot about encryption ciphers and the different types of methods that we’re going to use when it comes to securing our traffic. So we’re going to start off with a pretty long dissertation for me about encryption basics. Probably tell you more than you want to know about some of the different types of algorithms, and then, of course, we’ll assign those into why it’s important for us with the wireless LAN encryption methods. Again, we’re going…

CWNP CWSP – Module 02 – Legacy Security

Demo – Security Associations Part A So what we’re going to do right now is look at some of the options that we have for the types of security. And the two that we talked about in this module was the open authentication and the use of Web. And so I would like to demonstrate both of those. So what we see here is I’m going to go into the well, I guess I have to log back in. Let me open this back up again. So I’m going to…

CompTIA CYSA+ CS0-002 – Incident Response Preparation Part 3

Reporting Requirements (OBJ 4.1) Reporting requirements. In this lesson, we are going to talk about the different reporting requirements that you may have to face as an incident responder. Now, again, this is something we have to think about all the way back in our preparation phase to ensure we’re ready to do our reporting as required by law or regulation. Now, when we talk about reporting requirements, these are notifications that must be made to the affected parties in the event of a data breach as required by legislation…

CompTIA CYSA+ CS0-002 – Incident Response Preparation Part 2

Data Criticality (OBJ 4.1) Data criticality. Data criticality is extremely important to think about all the way back in your preparation phase. This is going to affect your different standard operating procedures and your playbooks, as well as your instant response plans overall. Now, the reason this is so important is because everything we deal with is really concerned with the data on those systems. When I’m looking at a system, I don’t really care that this server or that server has been attacked by a hacker, but I do…

CompTIA CYSA+ CS0-002 – Incident Response Preparation Part 1

Incident Response Preparation (Introduction) In this section of the course, we’re going to discuss incident Response Preparation. Now, over the next few sections together, we’re going to cover the full Incident Response process. But in this section, we’re really going to dive in deep into the Incident Response Preparation phase. This will help us in our coverage of Domain Four, and we’ll focus on Objectives 4. 1 and 4. 2. Objective 4. 1 states that you have to be able to explain the importance of the Incident Response process. Objective…

img