MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.

I'm not curious

Implementing Wireless Security in a BYOD Environment

Course Summary

This course explains Wi-Fi security with a focus on implementing WPA2 to meet the growing demands for BYOD. The course begins with a discussion of common wireless attacks and countermeasures, and then details the different Wi-Fi security mechanisms. It compares and contrasts the different encryption, authentication, and message authentication options to help you select the right security mechanisms for your organization.

  • +

    Course Syllabus

    Course Introduction
    - 13m 5s

    —What You Need to Know About This Course Before You Watch It 13m 5s
    Designing a BYOD Wireless Network Security Policy
    - 39m 25s

    —Defining a Wireless Network Policy 9m 13s
    —Templates to Help Create/Refine Wireless Network Policies 20m 29s
    —Tools Used for the Wireless Demonstrations in This Course 7m 14s
    —Preparing Your Organization for BYOD 2m 28s
    Roaming Wireless Network Security Threats and Countermeasures
    - 45m 8s
    Enterprise Wireless Network Security Threats and Countermeasures
    - 52m 29s
    Using Encryption to Protect Data From Eavesdroppers
    - 33m 11s
    Wi-Fi Authentication for Protecting Access to Sensitive Systems
    - 36m 48s
    Alternative Mechanisms for Protecting Access to Wi-Fi Networks
    - 50m 26s
    Implementing Message Integrity to Protect Against Attacks
    - 32m 45s

Course Fee:
USD 29

Course Type:


Course Status:



1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url