Wireless Security Protocols and Authentication (A+1202)

By completing this lab, you will be able to:

Wireless Security Fundamentals

  • Understand wireless attack vectors and vulnerabilities.
  • Compare encryption protocols and their effectiveness.
  • Identify appropriate security measures for different scenarios.
  • Recognize signs of wireless security breaches.

Protocol Implementation

  • Configure WPA2 and WPA3 security settings.
  • Implement enterprise authentication with RADIUS.
  • Deploy certificate-based authentication.
  • Manage pre-shared keys effectivel.

Advanced Wireless Security

  • Understand 802.1X authentication framework.
  • Configure guest network isolation.
  • Implement MAC address filtering appropriately.
  • Deploy wireless intrusion detection system.

CompTIA A+ 220-1202 Exam Objective Mapping

This lab directly addresses the following CompTIA A+ Core 2 (220-1202) certification exam objectives:

Exam ObjectiveDescriptionLab Topics Covered
2.1Summarize various security measures and their purposesWireless security protocols: WEP, WPA, WPA2, WPA3; Encryption standards
2.6Given a scenario, configure a workstation to meet best practices for securityWireless network security configuration, authentication methods
2.9Given a scenario, configure appropriate security settings on SOHO wireless and wired networksSSID configuration, encryption selection, guest network isolation

Overview

This comprehensive theory lab provides in-depth knowledge of wireless security protocols and authentication methods—critical understanding for IT professionals and CompTIA A+ certification candidates. Covering objectives from the 220-1102 exam, you'll develop expertise in securing wireless networks, understanding encryption standards, and implementing authentication mechanisms that protect against evolving wireless threats.

Through guided reading and practical exercises, you'll master the evolution of wireless security from Wired Equivalent Privacy (WEP) through Wi-Fi Protected Access (WPA3), understand various authentication methods including enterprise implementations, and learn to configure secure wireless environments. This knowledge is fundamental for IT professionals who must design, deploy, and maintain secure wireless networks in residential and enterprise settings.

Key terms and descriptions

WPA3
Latest Wi-Fi security protocol with enhanced encryption
802.1X
Port-based network access control standard
RADIUS
Remote Authentication Dial-In User Service
EAP
Extensible Authentication Protocol framework
CCMP
Counter Mode with CBC-MAC Protocol encryption
SAE
Simultaneous Authentication of Equals in WPA3
TKIP
Temporal Key Integrity Protocol (deprecated)
PMK
Pairwise Master Key in WPA key hierarchy
Captive Portal
Web page for network access authentication
PEAP
Protected Extensible Authentication Protocol
Forward Secrecy
Protection of past sessions from future compromise
4-Way Handshake
WPA2 key establishment process
GTK
Group Temporal Key for broadcast traffic
WPS
Wi-Fi Protected Setup (vulnerable)
KRACK
Key Reinstallation Attack against WPA2