SearchSecurity.com's Wireless Lunchtime Learning Security School allows information security professionals to develop an in-depth understanding of those risks and their countermeasures in a format that's convenient for you.
Each lesson's featured video runs approximately 25-30 minutes, the perfect length to slip into a lunch break. And each video is supported by a series of short technical tips that help you to apply the principles of the video to your own network infrastructure. All of these resources are available on demand, so you can learn on your own schedule.
How much do you know about enterprise wireless LAN security? Test your knowledge of how to secure a wireless LAN before jumping into the Wireless Security School Lessons.
Table of contents:
How to counter wireless threats and vulnerabilities


Also included in Lesson 1 are the following technical tips:
- An introduction to wireless security
- List of wireless network attacks
- A wireless network vulnerability assessment checklist
- Hunting for rogue wireless devices
How to build a secure wireless infrastructure


Also included in Lesson 2 are the following technical tips:
- How to compartmentalize WiFi traffic with a VLAN
- The role of VPN in an enterprise wireless network
- Wireless AP placement basics
Implementing secure wireless access


Also included in Lesson 3 are the following technical tips:
- Security on a budget: How to control access to a WLAN
- 802.1X Port Access Control: Which version is best for you?
- How to configure VLANs with 802.1X for WLAN authorization
- Defeating Evil Twin attacks
How to use wireless IPS


Also included in Lesson 4 are the following technical tips:
- How to prevent wireless DoS attacks
- Rogue AP containment methods
- Wireless intrusion prevention systems: Overlay vs. embedded sensors
- How to monitor WLAN performance with WIPS
Final Exam and Meet the Instructor
WIRELESS SECURITY LUNCHTIME LEARNING: FINAL EXAM
You've finished Wireless Security Lunchtime Learning, now take this 10-question, multiple-choice exam to see how much you've retained. Take the final exam now.
ABOUT THE INSTRUCTOR:
Lisa Phifer owns Core Competence Inc., a consulting firm specializing in business use of emerging Internet technologies. Lisa has been involved in the design, implementation and evaluation of internetworking, security and management products for 30 years.
At Core Competence, she has advised large and small companies regarding security needs, product assessment and the use of emerging technologies and best practices. She teaches about wireless LAN and mobile device administration and security, and has written extensively for numerous publications, including Information Security, SearchSecurity, SearchMobileComputing, TomsITPro, and Wi-Fi Planet. Phifer's insight columns and technical tips are published monthly by SearchNetworking and the AirWISE Community Security Center. She holds an MS, Computer Science from Villanova University, and a BS in Computer Science from West Chester University.
Read more content from Lisa Phifer.
Security Management Strategies for the CIO