School

Wireless network security lunchtime learning

Whether your company has grown its WLAN organically (from a pilot project to a loose-knit production network), officially deployed a WLAN or implemented a strict policy against WLANs, Wi-Fi poses risks to your network. Our Wireless Security Lunchtime Learning program allows you to develop an in-depth understanding of those risks and their countermeasures in a format that's convenient for you. Each webcast runs 15-20 minutes, the perfect length to slip into a lunch break. And each webcast is supported by a series of short technical tips that help you apply the principles of the webcast to your own network infrastructure. All of these resources are available on demand, so you can learn on your own schedule. As a bonus, through our agreement with (ISC)², CISSPs and SSCPs who attend all four webcasts can earn one CPE credit. (Click here for details)

   Course Outline
   Entrance exam
   Lesson 1: How to counter wireless threats and vulnerabilities
   Lesson 2: How to build a secure wireless infrastructure
   Lesson 3: How to implement secure access
   Lesson 4: How to use wireless IDS/IPS
   Final exam
   About the Instructor

(IE only)
RELATED INFORMATION
Send the editor your feedback on this School

Learn about earning CPE credits

Read our Guide to wireless security

Read our 802.xx Fast Reference

Read our Wireless LAN Resource Guide



SPONSORED BY:
       

  Wireless Security Lunchtime Learning Course Outline



Entrance exam
Assess your knowledge of wireless LAN security with this 10-question multiple choice entrance exam.
TAKE THE EXAM



Lesson 1: How to counter wireless threats and vulnerabilities

  • Introduction
    Learn the business risks posed by wireless LANs, essential countermeasures that can reduce those risks, and industry best practices for designing, deploying and monitoring secure wireless LANs.
    READ THE INTRODUCTION

  • Webcast: Risky business: Understanding Wi-Fi threats
    Length: 20 minutes
    Listen to this on-demand webcast and learn why most WLANs are inherently vulnerable, right from deployment. You will see how hackers leverage common weaknesses to gather confidential data, prey upon wireless users and penetrate business networks.

    VIEW THIS WEBCAST

  • Tip: Wireless attacks, A to Z
    This reference chart categorizes according to vulnerability common and uncommon Wi-Fi attacks, and maps them to associated hacker methods and tools.
    READ THIS TIP

  • Tip: Wi-Fi vulnerability assessment checklist
    This checklist provides a framework from which to develop a vulnerability assessment process to help you find and fix your WLAN's weaknesses before attackers take advantage of them.
    GET THE CHECKLIST

  • Tip: Recipe for rogue hunting
    This tip describes a methodical process for tracking down rogue 802.11 devices and identifies tools that can make this common task easier.
    READ THIS TIP

  • Quiz
    Test your retention of the material taught in Lesson 1 of Wireless Security Lunchtime Learning.
    TAKE THE QUIZ



Lesson 2: How to build a secure wireless infrastructure



Lesson 3: How to implement secure access



Lesson 4: How to use wireless IDS/IPS



Final Exam
You've finished Wireless Security Lunchtime Learning, now take this 10-question multiple-choice exam to see how much you've retained.
TAKE THE FINAL EXAM
  About the Instructor

Lisa Phifer owns Core Competence Inc., a consulting firm specializing in network security and management technology. Lisa has been involved in the design, implementation and evaluation of data communications, internetworking, security and network management products for over 20 years. At Core Competence, she has advised large and small companies regarding security needs, product assessment and the use of emerging technologies and best practices. Before joining Core Competence, Lisa was a Member of Technical Staff at Bell Communications Research where she won a president's award for her work on ATM Network Management.

Lisa teaches about wireless LANs, mobile security and virtual private networking at many industry conferences and on-line webinars. Lisa's WLAN Advisor and Wireless-To-Go columns are published by SearchNetworking.com and SearchMobileComputing.com where she is a site expert on wireless LANs. She also has written extensively about network infrastructure and security technologies for numerous publications including Wi-Fi Planet, ISP-Planet, Business Communications Review, Information Security and SearchSecurity.com.

  

This was first published in April 2006

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: