News

Wireless Security Lunchtime Learning

Whether your company has grown its WLAN organically (from a pilot project to a loose-knit production network), officially deployed a WLAN or implemented a strict policy against WLANs, Wi-Fi poses risks to your network. Our Wireless Security Lunchtime Learning program allows you to develop an in-depth understanding of those risks and their countermeasures in a format that's convenient for you. Each webcast runs 15-20 minutes, the perfect length to slip into a lunch break. And each webcast is supported by a series of short technical tips that help you apply the principles of the webcast to your own network infrastructure. All of these resources are available on demand, so you can learn on your own schedule. As a bonus, through our agreement with (ISC)², CISSPs and SSCPs who attend all four webcasts can earn one CPE credit, as well as a certificate of completion from SearchSecurity.com. (Click here for details)

   Course Outline
   Entrance exam
   Lesson 1: How to counter wireless threats and vulnerabilities
   Lesson 2: How to build a secure wireless infrastructure
   Lesson 3: How to implement secure access
   Lesson 4: How to use wireless IDS/IPS
   Final exam
   About the Instructor

(IE only)
SCHOOL HIGHLIGHTS
Send the editor your feedback on this Security School

Learn about earning CPE credits

Visit our Security School for CISSP training

Visit our E-mail Security School

Visit our Web Security School

Visit our SOX Security School

Wireless Security Lunchtime Learning Course Outline




Entrance exam
Assess your knowledge of wireless LAN security with this 10-question multiple choice entrance exam.
TAKE THE EXAM



Lesson 1: How to counter wireless threats and vulnerabilities

  • Introduction
    Learn the business risks posed by wireless LANs, essential countermeasures that can reduce those risks, and industry best practices for designing, deploying and monitoring secure wireless LANs.
    READ THE INTRODUCTION

  • Webcast: Risky business: Understanding Wi-Fi threats
    Length: 20 minutes
    Listen to this on-demand webcast and learn why most WLANs are inherently vulnerable, right from deployment. You will see how hackers leverage common weaknesses to gather confidential data, prey upon wireless users and penetrate business networks.

    VIEW THIS WEBCAST    DOWNLOAD MP3

  • Tip: Wireless attacks, A to Z
    This reference chart categorizes according to vulnerability common and uncommon Wi-Fi attacks, and maps them to associated hacker methods and tools.
    READ THIS TIP

  • Tip: Wi-Fi vulnerability assessment checklist
    This checklist provides a framework from which to develop a vulnerability assessment process to help you find and fix your WLAN's weaknesses before attackers take advantage of them.
    GET THE CHECKLIST

  • Tip: Recipe for rogue hunting
    This tip describes a methodical process for tracking down rogue 802.11 devices and identifies tools that can make this common task easier.
    READ THIS TIP

  • Quiz
    Test your retention of the material taught in Lesson 1 of Wireless Security Lunchtime Learning.
    TAKE THE QUIZ



Lesson 2: How to build a secure wireless infrastructure



Lesson 3: How to implement secure access



Lesson 4: How to use wireless IDS/IPS



Final exam
You've finished Wireless Security Lunchtime Learning, now take this 10-question multiple-choice exam to see how much you've retained.
TAKE THE FINAL EXAM
  About the Instructor

Lisa Phifer owns Core Competence Inc., a consulting firm specializing in network security and management technology. Lisa has been involved in the design, implementation and evaluation of data communications, internetworking, security and network management products for over 20 years. At Core Competence, she has advised large and small companies regarding security needs, product assessment and the use of emerging technologies and best practices. Before joining Core Competence, Lisa was a Member of Technical Staff at Bell Communications Research where she won a president's award for her work on ATM Network Management.

Lisa teaches about wireless LANs, mobile security and virtual private networking at many industry conferences and on-line webinars. Lisa's WLAN Advisor and Wireless-To-Go columns are published by SearchNetworking.com and SearchMobileComputing.com where she is a site expert on wireless LANs. She also has written extensively about network infrastructure and security technologies for numerous publications including Wi-Fi Planet, ISP-Planet, Business Communications Review, Information Security and SearchSecurity.com.

  

Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
 

COMMENTS powered by Disqus  //  Commenting policy