Wireless networks: Implementing secure Wi-Fi

Building secure Wi-Fi networks can be a challenge. Our "Wireless networks: Implementing secure Wi-Fi" guide allows you to develop an in-depth understanding of the risks associated with Wi-Fi and the countermeasures you can use to provide wireless networks that will withstand the attacks that are sure to come along. Our multimedia learning format is convenient -- each webcast runs 15-20 minutes, the perfect length to slip into a lunch or coffee break. And each webcast is supported by a series of short technical tips that help you apply the principles of the webcast to your own infrastructure.

Entrance exam
Assess your knowledge of wireless security with this 10-question multiple choice entrance exam.

Lesson 1: How to counter wireless threats and vulnerabilities

  • Introduction
    Learn the business risks posed by wireless LANs, essential countermeasures that can reduce those risks, and industry best practices for designing, deploying and monitoring secure Wi-Fi.

  • Webcast: Risky business: Understanding Wi-Fi threats
    Length: 20 minutes
    Listen to this on-demand webcast and learn why most WLANs are inherently vulnerable, right from deployment. You will see how hackers leverage common weaknesses to gather confidential data, prey upon wireless users and penetrate networks.

  • Tip: Wireless attacks, A to Z
    This reference chart categorizes according to vulnerability common and uncommon Wi-Fi attacks, and maps them to associated hacker methods and tools.

  • Tip: Wi-Fi vulnerability assessment checklist
    This checklist provides a framework from which to develop a vulnerability assessment process to help you find and fix your WLAN's weaknesses before attackers take advantage of them.

  • Tip: Recipe for rogue hunting
    This tip describes a methodical process for tracking down rogue 802.11 devices and identifies tools that can make this common task easier.

  • Quiz
    Test your retention of the material taught in Lesson 1 of Wireless networks: Implementing secure Wi-Fi .

Lesson 2: How to build a secure wireless infrastructure

Lesson 3: How to implement secure access

Lesson 4: How to use wireless IDS/IPS

Final Exam
You've finished Wireless networks: Implementing secure Wi-Fi, now take this 10-question multiple-choice exam to see how much you've retained.
  About the Instructor

Lisa Phifer owns Core Competence Inc., a consulting firm specializing in network security and management technology. Lisa has been involved in the design, implementation and evaluation of data communications, internetworking, security and network management products for over 20 years. At Core Competence, she has advised large and small companies regarding security needs, product assessment and the use of emerging technologies and best practices. Before joining Core Competence, Lisa was a Member of Technical Staff at Bell Communications Research where she won a president's award for her work on ATM Network Management.

Lisa teaches about wireless LANs, mobile security and virtual private networking at many industry conferences and on-line webinars. Lisa's articles are published by and where she is a site expert on wireless LANs. She also has written extensively about network infrastructure and security technologies for numerous publications including Wi-Fi Planet, ISP-Planet, Business Communications Review, Information Security and


This was first published in July 2007

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: