Implementing Wireless Security in a BYOD Environment

This course explains Wi-Fi security with a focus on implementing WPA2 to meet the growing demands for BYOD. The course begins with a discussion of common wireless attacks and countermeasures, and then details the different Wi-Fi security mechanisms. It compares and contrasts the different encryption, authentication, and message authentication options to help you select the right security mechanisms for your organization.
Course info
Rating
(29)
Level
Intermediate
Updated
Feb 5, 2015
Duration
5h 3m
Table of contents
Course Introduction
Designing a BYOD Wireless Network Security Policy
Roaming Wireless Network Security Threats and Countermeasures
Enterprise Wireless Network Security Threats and Countermeasures
Using Encryption to Protect Data From Eavesdroppers
Wi-Fi Authentication for Protecting Access to Sensitive Systems
Alternative Mechanisms for Protecting Access to Wi-Fi Networks
Implementing Message Integrity to Protect Against Attacks
Description
Course info
Rating
(29)
Level
Intermediate
Updated
Feb 5, 2015
Duration
5h 3m
Description

This course explains Wi-Fi security with a focus on implementing WPA2 to meet the growing demands for BYOD. The course begins with a discussion on common wireless attacks, demonstrates how you can detect these attacks, and describes the countermeasures you can put in place to protect your network. Rogue access points, DoS, and use of public hotspots are covered. The course then details the different security mechanisms defined in the 802.11 specifications, starting with the different encryption options, including the risks associated with using WEP and TKIP, and the transition to AES. There is an in-depth look at the different authentication mechanisms, including MAC, 802.1x, and Web-based authentication. The course concludes with a detailed discussion on TKIP and CCMP message authentication, and the new 802.11w mechanism that protects management frames. Details on the security changes made to support the new 802.11ac very high throughput standard are also covered.

About the author
About the author

Dr. Salter is a consultant, writer and technical trainer with over 20 years of industry experience in deploying networks and managing IT operations.

More from the author
Wireshark Core Protocol Analysis
Beginner
4h 19m
Oct 24, 2016
Wireshark 2.0: Fundamentals
Beginner
4h 10m
Jul 5, 2016
More courses by Avril Salter
Section Introduction Transcripts
Section Introduction Transcripts

Enterprise Wireless Network Security Threats and Countermeasures
Hi my name is Avril Salter. Welcome to this module on Wireless Network Security Threats and Countermeasures in the Enterprise. When you're implementing wireless network in the enterprise you have to balance the benefits and opportunities that that wireless connectivity gives you with the security risk and the exposure that your networks might have. And when we extend those wireless networks to our employees and guests that bring their own devices and connect them to the network, it extends both the benefits and opportunities and also the risks associated with allowing those devices to connect to the network. We talked about many of the benefits earlier on, cost savings, productivity gains, familiarity of your users with their equipment, but allowing the diversity of these devices to connect to our networks exposes risks and vulnerabilities as well. And in this module we're going to talk about those risks and vulnerabilities. Now rather than giving you a full comprehensive list of all the possible attacks, what I've done is I've chosen three of the primary attacks that you see on the wireless network and what I want to do is get you to think about, as you're learning each of these attacks, the diversity between these attacks, and that should give you a feeling for how varied the wireless network attacks can be, and help you understand when you're setting your security policies that you need to consider multiple different aspects of wireless networks. I think you're really going to enjoy this module.