Wireless networks: Implementing secure Wi-Fi

Learn the security risks associated with Wi-Fi and the countermeasures you can use to provide wireless networks that will withstand the attacks that are sure to come along.

Building secure Wi-Fi networks can be a challenge. Our "Wireless networks: Implementing secure Wi-Fi" guide allows you to develop an in-depth understanding of the risks associated with Wi-Fi and the countermeasures you can use to provide wireless networks that will withstand the attacks that are sure to come along. Our multimedia learning format is convenient -- each webcast runs 15-20 minutes, the perfect length to slip into a lunch or coffee break. And each webcast is supported by a series of short technical tips that help you apply the principles of the webcast to your own infrastructure.

Entrance exam
Assess your knowledge of wireless security with this 10-question multiple choice entrance exam.
TAKE THE EXAM



Lesson 1: How to counter wireless threats and vulnerabilities

  • Introduction
    Learn the business risks posed by wireless LANs, essential countermeasures that can reduce those risks, and industry best practices for designing, deploying and monitoring secure Wi-Fi.
    READ THE INTRODUCTION

  • Webcast: Risky business: Understanding Wi-Fi threats
    Length: 20 minutes
    Listen to this on-demand webcast and learn why most WLANs are inherently vulnerable, right from deployment. You will see how hackers leverage common weaknesses to gather confidential data, prey upon wireless users and penetrate networks.
    VIEW THIS WEBCAST

  • Tip: Wireless attacks, A to Z
    This reference chart categorizes according to vulnerability common and uncommon Wi-Fi attacks, and maps them to associated hacker methods and tools.
    READ THIS TIP

  • Tip: Wi-Fi vulnerability assessment checklist
    This checklist provides a framework from which to develop a vulnerability assessment process to help you find and fix your WLAN's weaknesses before attackers take advantage of them.
    GET THE CHECKLIST

  • Tip: Recipe for rogue hunting
    This tip describes a methodical process for tracking down rogue 802.11 devices and identifies tools that can make this common task easier.
    READ THIS TIP

  • Quiz
    Test your retention of the material taught in Lesson 1 of Wireless networks: Implementing secure Wi-Fi .
    TAKE THE QUIZ



Lesson 2: How to build a secure wireless infrastructure



Lesson 3: How to implement secure access



Lesson 4: How to use wireless IDS/IPS



Final Exam
You've finished Wireless networks: Implementing secure Wi-Fi, now take this 10-question multiple-choice exam to see how much you've retained.
TAKE THE FINAL EXAM
  About the Instructor

Lisa Phifer owns Core Competence Inc., a consulting firm specializing in network security and management technology. Lisa has been involved in the design, implementation and evaluation of data communications, internetworking, security and network management products for over 20 years. At Core Competence, she has advised large and small companies regarding security needs, product assessment and the use of emerging technologies and best practices. Before joining Core Competence, Lisa was a Member of Technical Staff at Bell Communications Research where she won a president's award for her work on ATM Network Management.

Lisa teaches about wireless LANs, mobile security and virtual private networking at many industry conferences and on-line webinars. Lisa's articles are published by SearchNetworking.com and SearchMobileComputing.com where she is a site expert on wireless LANs. She also has written extensively about network infrastructure and security technologies for numerous publications including Wi-Fi Planet, ISP-Planet, Business Communications Review, Information Security and SearchSecurity.com.

  
This was first published in July 2007

Dig deeper on Telecom Resources

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchNetworking

SearchDataCenter

SearchCloudComputing

SearchCloudProvider

Close