Implementing Wireless Security in a BYOD Environment

Pluralsight
Course Summary
This course explains Wi-Fi security with a focus on implementing WPA2 to meet the growing demands for BYOD. The course begins with a discussion of common wireless attacks and countermeasures, and then details the different Wi-Fi security mechanisms. It compares and contrasts the different encryption, authentication, and message authentication options to help you select the right security mechanisms for your organization.
-
+
Course Description
This course explains Wi-Fi security with a focus on implementing WPA2 to meet the growing demands for BYOD. The course begins with a discussion on common wireless attacks, demonstrates how you can detect these attacks, and describes the countermeasures you can put in place to protect your network. Rogue access points, DoS, and use of public hotspots are covered. The course then details the different security mechanisms defined in the 802.11 specifications, starting with the different encryption options, including the risks associated with using WEP and TKIP, and the transition to AES. There is an in-depth look at the different authentication mechanisms, including MAC, 802.1x, and Web-based authentication. The course concludes with a detailed discussion on TKIP and CCMP message authentication, and the new 802.11w mechanism that protects management frames. Details on the security changes made to support the new 802.11ac very high throughput standard are also covered.
-
+
Course Syllabus
Course Introduction- 13m 5s
—What You Need to Know About This Course Before You Watch It 13m 5sDesigning a BYOD Wireless Network Security Policy- 39m 25s
—Defining a Wireless Network Policy 9m 13s
—Templates to Help Create/Refine Wireless Network Policies 20m 29s
—Tools Used for the Wireless Demonstrations in This Course 7m 14s
—Preparing Your Organization for BYOD 2m 28sRoaming Wireless Network Security Threats and Countermeasures- 45m 8sEnterprise Wireless Network Security Threats and Countermeasures- 52m 29sUsing Encryption to Protect Data From Eavesdroppers- 33m 11sWi-Fi Authentication for Protecting Access to Sensitive Systems- 36m 48sAlternative Mechanisms for Protecting Access to Wi-Fi Networks- 50m 26sImplementing Message Integrity to Protect Against Attacks- 32m 45s