Wireless networks: Implementing secure Wi-Fi
Learn the security risks associated with Wi-Fi and the countermeasures you can use to provide wireless networks that will withstand the attacks that are sure to come along.
Building secure Wi-Fi networks can be a challenge. Our "Wireless networks: Implementing secure Wi-Fi" guide allows you to develop an in-depth understanding of the risks associated with Wi-Fi and the countermeasures you can use to provide wireless networks that will withstand the attacks that are sure to come along. Our multimedia learning format is convenient -- each webcast runs 15-20 minutes, the perfect length to slip into a lunch or coffee break. And each webcast is supported by a series of short technical tips that help you apply the principles of the webcast to your own infrastructure.
Entrance exam
Assess your knowledge of wireless security with this 10-question multiple choice entrance exam.
TAKE THE EXAM
Lesson 1: How to counter wireless threats and vulnerabilities
- Introduction
Learn the business risks posed by wireless LANs, essential countermeasures that can reduce those risks, and industry best practices for designing, deploying and monitoring secure Wi-Fi.
READ THE INTRODUCTION - Webcast: Risky business: Understanding Wi-Fi threats
Length: 20 minutes
Listen to this on-demand webcast and learn why most WLANs are inherently vulnerable, right from deployment. You will see how hackers leverage common weaknesses to gather confidential data, prey upon wireless users and penetrate networks.
VIEW THIS WEBCAST - Tip: Wireless attacks, A to Z
This reference chart categorizes according to vulnerability common and uncommon Wi-Fi attacks, and maps them to associated hacker methods and tools.
READ THIS TIP - Tip: Wi-Fi vulnerability assessment checklist
This checklist provides a framework from which to develop a vulnerability assessment process to help you find and fix your WLAN's weaknesses before attackers take advantage of them.
GET THE CHECKLIST - Tip: Recipe for rogue hunting
This tip describes a methodical process for tracking down rogue 802.11 devices and identifies tools that can make this common task easier.
READ THIS TIP - Quiz
Test your retention of the material taught in Lesson 1 of Wireless networks: Implementing secure Wi-Fi .
TAKE THE QUIZ
Lesson 2: How to build a secure wireless infrastructure
- Webcast: From the ground up: Creating a secure wireless infrastructure
Length: 20 minutes
This webcast explains the myriad Wi-Fi security standards and features in a clear, concise fashion so that you can choose Wi-Fi products that fit within a network architecture that has been designed with security in mind.
VIEW THIS WEBCAST - Tip: Getting from here to there: WPA2 migration strategy
This tip recommends a workable strategy for migration to WPA2, permitting peaceful coexistence between old and new devices with divergent security features.
READ THIS TIP - Tip: Using VLANs to compartmentalize WLAN traffic
Learn how to use VLAN capabilities to tag and compartmentalize Wi-Fi traffic, supporting your company's security and traffic management policies.
READ THIS TIP - Tip: The ins and outs of AP placement
This tip offers network topology and physical positioning recommendations for safer AP deployment.
READ THIS TIP - Quiz
Find out how much you learned in Lesson 2.
TAKE THE QUIZ
Lesson 3: How to implement secure access
- Webcast: Who goes there?: Securing wireless access
Length: 25 minutes
This webcast describes readily-available WLAN access controls, from MAC ACLs to Preshared Secret Keys to help you choose the best method to control, authenticate and authorize access to your own WLAN.
VIEW THIS WEBCAST - Tip: Controlling WLAN access on a tight budget
Learn the alternatives -- and their pros and cons -- for securing WLAN access with a limited staff and budget.
READ THIS TIP - Tip: Choosing the right flavor of 802.1X
This tip provides a direct comparison of the most popular EAP Types used with 802.1X today, the authentication methods supported by each, known vulnerabilities associated with them and suitable usage environments.
READ THIS TIP - Tip: Combining 802.1X and VLANs for WLAN authorization
Learn how to use RADIUS attributes returned by 802.1X to supply VLAN tags, establishing that critical link between authentication and authorization.
READ THIS TIP - Tip: Defeating Evil Twin attacks
This tip describes several steps that your company can take to defend employees against this poorly-understood attack.
READ THIS TIP - Quiz
Put your new knowledge of wireless access to the test.
TAKE THE QUIZ
Lesson 4: How to use wireless IDS/IPS
- Webcast: I'll be watching you: Wireless IDS/IPS
Length: 20 minutes
This webcast describes the role of WIDS/WIPS in WLAN security, the features commonly provided by WIDS/WIPS, and how WIDS/WIPS differ from (and complement) their wired network counterparts.
VIEW THIS WEBCAST - Tip: Fighting wireless DoS attacks
Get practical advice on how to recognize and respond to DoS attacks launched against your WLAN.
READ THIS TIP - Tip: To block or not to block: Rogue containment methods
This tip explores how wireless network monitoring system containment features work, their potential side-effects and what network engineers should consider before activating them.
READ THIS TIP - Tip: Overlay vs. embedded WIDS sensors
This tip compares overlay and embedded WIDSes so that you can choose the one that best fits your network and security needs.
READ THIS TIP - Tip: Using your WIDS to monitor WLAN performance
Learn how to leverage your WIDS to get more from your WLAN.
READ THIS TIP - Quiz
Find out how much you learned from Lesson 4.
TAKE THE QUIZ

Final Exam
You've finished Wireless networks: Implementing secure Wi-Fi, now take this 10-question multiple-choice exam to see how much you've retained.
TAKE THE FINAL EXAM
About the Instructor |
![]() |
|
![]() |
Lisa teaches about wireless LANs, mobile security and virtual private networking at many industry conferences and on-line webinars. Lisa's articles are published by SearchNetworking.com and SearchMobileComputing.com where she is a site expert on wireless LANs. She also has written extensively about network infrastructure and security technologies for numerous publications including Wi-Fi Planet, ISP-Planet, Business Communications Review, Information Security and SearchSecurity.com.
Start the conversation
0 comments