NEW! Wi-Fi Security

First time offered! Includes WPA3 Update

Instructor: Daniel Wong

Wednesday, 25 July 2018 - 9:00am to 4:30pm EDT

Online via WebEx

Learn More:


$279 IEEE ComSoc member
$349 IEEE member
$459 non-member

Not a member?  Join ComSoc Today
IEEE Members can add ComSoc to their membership.

Review the system requirements for WebEx.
Test your browser by joining a meeting

Contact Us

Course Description

Everyone uses Wi-Fi.  However, most people may not have a strong understanding of what the differences are between the available security options, like WPA, WPA-PSK, WPA2, TKIP, AES, etc. You may even have heard that WEP is supposed to be bad, but you are not be sure how WPA and WPA2 improve on it. Furthermore, because Wi-Fi security started from something very weak, and then was improved in stages, it can be very helpful to trace through the various generations of Wi-Fi security, and thus gain a better understanding of wireless security.

This course explains the motivations for wireless and Wi-Fi security and describes initial attempts with open authentication, WEP-based authentication, WEP encryption, etc.  We will then explore the many problems with WEP, its use of keys, etc.; and ways that it can be broken.  We’ll then discuss how WPA, as a stopgap measure, addresses some of the issues with WEP and how WPA2 is even more secure.  The IEEE 802.1X model, and the difference between PSK and enterprise modes will then be explained.  Recent updates on WPA3 will also be discussed.  WPA3 introduces a range of security enhancements to Wi-Fi systems.

Who Should Attend

This course is ideal for wireless and telecomm engineers, researchers, and students (advanced undergraduates or graduate students), as well as computer science practitioners, researchers and students, who are interested in understanding:

  • the directions that Wi-Fi security has taken since the early embarrassment of WEP
  • how weaknesses in the earlier generations of wireless security, and even WPS, could be exploited
  • how WPA, WPA2, and their variations work, what is the difference between personal and enterprise modes, etc.

The level of instruction is intermediate to advanced.  

Pre-requisites: Knowledge of Wi-Fi on the level of the ComSoc Training course, An Introduction to Wi-Fi is helpful. However, a brief review of Wi-Fi will be provided at the beginning of this course.


NEW!  Wi-Fi Security

Daniel Wong

President, Daniel Wireless LLC, IEEE WCP

K. Daniel Wong is President of Daniel Wireless LLC, a California-registered company that provides consulting and training in wireless, networking and software. He has over 20 years experience in wireless communications, both in industry and academia. Daniel is also an experienced speaker and teacher, having taught many highly-rated university level courses, industry short courses and tutorials at conferences, to a wide range of students from industry, government and academia. He is a member of the Practice Analysis Task Force that helped create IEEE's WCET certification program, and a co-author and co-editor of "A Guide to the Wireless Engineering Body of Knowledge" (WEBOK). Daniel is also the author of "Wireless Internet Telecommunications" (Artech House, 2004) and "Fundamentals of Wireless Communication Engineering Technologies" (Wiley, 2012). Daniel graduated with a BSE (with Highest Honors) from Princeton University, and an MSc. and Ph.D from Stanford University, all in electrical engineering.

Learning Objectives

Upon completion of this course, students are expected to understand:

  • How to think of Wi-Fi systems from a security perspective, including how the different components are put together and work together to protect a Wi-Fi network.
  • How to design Wi-Fi deployments to optimize usage of security technologies.
  • The directions in which Wi-Fi security has been maturing as Wi-Fi has been developing.
  • How to explore Wi-Fi deployments using practical tools, with an understanding of how to use those tools to help examine the operation of the Wi-Fi networks, including security mechanisms.

Course Content

  • Introduction
    • Definitions, overview
    • WiFi overall concepts - very brief review
    • Motivations for WiFi security, and initial attempts
  • WEP
    • WEP authentication
    • WEP encryption
    • weaknesses
    • Ways WEP could be defeated to recover the key, etc.
    • Lessons learned
  • WPA & other stopgap measures
    • Motivations and constraints
    • TKIP
    • Other attempts: MAC-based filtering, browser hijacking architectures, etc.
    • Enterprise mode vs personal mode
    • 802.1X, EAP and WPA
    • Lessons learned
    • Ways WPA could be defeated with dictionary attacks, etc.
  • More on 802.1X and EAP and usage considerations
    • EAP for end-to-end secure authentication
    • Choosing between EAP alternatives
  • WPA2
    • An upgrade of WPA
    • AES
    • Use of AES in practice, e.g., AES-CCMP vs alternatives
    • Enterprise mode vs personal mode
    • Lessons learned
  • Misc related topics: WPS, social engineering, etc.
    • WPS for "ease" of set-up
    • Problems with WPS implementations
    • Tools for inspecting Wi Fi networks – wireshark, wireless tools, etc.
    • Promiscuous mode, monitor mode ..
    • Social engineering approaches
    • Planning your secure wireless network

Course Materials

A copy of the instructor's PowerPoint slides is included. Access to the streaming video recording is provided for 15 business days after the course has been taught. Earn 0.6 IEEE Continuing Education Units for participating and completing the post-course evaluation.

Course materials and WebEx invitations will be emailed to participants at least one business day in advance of the course date.

COURSE CANCELLATION and REFUND POLICY: Requests for online course cancellations must be received 3 business days prior to the course date for a full refund. Once course materials have been shared with a course participant cancellation and refund requests cannot be accommodated.

Course Agenda

Below is an approximate schedule for the day:

  • 9:00am - Facilitator Introduction
  • 9:10 - Instructor Lecture
    • Short break (10-15 minutes)
    • Instructor Lectures
  • 12:30pm Mid-point break (approx. 1 hour)
  • 1:30 pm Instructor Lectures
    • Short break (10-15 minutes)
    • Instructor Lectures
  • ​4:30pm course concludes

Contact Us