Network Security and Defense

  1. Wireless Network Security
    1. Wireless Standards
      1. 802.11 Protocol Family
        1. 802.11a Specifications
          1. 802.11b Characteristics
            1. 802.11g Features
              1. 802.11n Enhancements
                1. 802.11ac Capabilities
                  1. 802.11ax Improvements
                  2. Frequency Band Management
                    1. 2.4 GHz Band Characteristics
                      1. 5 GHz Band Features
                        1. Channel Allocation
                          1. Interference Mitigation
                        2. Wireless Security Protocols
                          1. Wired Equivalent Privacy
                            1. WEP Encryption Process
                              1. Key Management Weaknesses
                                1. Authentication Flaws
                                  1. Cryptographic Vulnerabilities
                                  2. Wi-Fi Protected Access
                                    1. WPA Improvements
                                      1. Temporal Key Integrity Protocol
                                        1. Message Integrity Check
                                          1. Key Management Enhancements
                                          2. WPA2 Implementation
                                            1. AES-CCMP Encryption
                                              1. Robust Security Network
                                                1. Pre-Shared Key Mode
                                                  1. Enterprise Mode Features
                                                  2. WPA3 Security Features
                                                    1. Simultaneous Authentication of Equals
                                                      1. Enhanced Open Networks
                                                        1. Protected Management Frames
                                                          1. Forward Secrecy
                                                        2. Wireless Authentication
                                                          1. Pre-Shared Key Authentication
                                                            1. PSK Configuration
                                                              1. Key Distribution Challenges
                                                                1. Security Limitations
                                                                2. Enterprise Authentication
                                                                  1. 802.1X Framework
                                                                    1. Extensible Authentication Protocol
                                                                      1. RADIUS Integration
                                                                        1. Certificate-Based Authentication
                                                                      2. Wireless Attack Vectors
                                                                        1. Rogue Access Points
                                                                          1. Unauthorized AP Detection
                                                                            1. Evil Twin Attacks
                                                                              1. AP Impersonation
                                                                              2. Wireless Eavesdropping
                                                                                1. Packet Capture Techniques
                                                                                  1. Traffic Analysis
                                                                                    1. Credential Harvesting
                                                                                    2. Deauthentication Attacks
                                                                                      1. Management Frame Exploitation
                                                                                        1. Denial of Service
                                                                                          1. Forced Reconnection
                                                                                          2. War Driving
                                                                                            1. Network Discovery
                                                                                              1. Vulnerability Assessment
                                                                                                1. Geographic Mapping
                                                                                              2. WLAN Security Best Practices
                                                                                                1. Strong Authentication Implementation
                                                                                                  1. Encryption Protocol Selection
                                                                                                    1. Access Point Hardening
                                                                                                      1. Network Monitoring
                                                                                                        1. Guest Network Isolation