- [Narrator] Wireless networking is everywhere. We use wireless networks to provide network access to our smart phones, tablets and laptop computers, and to a wide variety of other devices, including televisions, thermostats and home automation systems. As the use of wireless networks continues to increase, the security of those networks becomes of critical importance. The most common wireless standard in use today is Wi-Fi technology. Wi-Fi is a set of standards, governed by the Institute of Electrical and Electronics Engineers and it describes the technical details of how wireless devices may communicate with each other and with wireless access points.
The use of a standard for wireless communications is absolutely essential, because without a standard wireless devices wouldn't speak the same language. Standardization is what allows any Wi-Fi device to work with any Wi-Fi network around the world. Wi-Fi works by replacing the wires and cables of wired networks, with radio transmitters and receivers. Every device that supports Wi-Fi contains a radio transceiver that is capable of communicating on one or more standard Wi-Fi bands.
From smart phones and laptops and video game consoles to internet connected smoke detectors, every Wi-Fi enabled device contains a small chip similar to the one shown here, and an antenna used to transmit and receive Wi-Fi signals. Most Wi-Fi networks are also connect to local networks that are in turn connected to the internet. This allows wireless devices to not only communicate with each other, but also communicate with wired devices and systems located anywhere on the internet.
This type of communication requires a connection between wireless networks and a wired network. Home and business networks use wireless access points, such as the one shown here, to perform that connection. These access points contain powerful antennas, transmitters and receivers that allow them to broadcast Wi-Fi signals over a large areas. They are also connected with a cable to a traditional wired network. Wireless devices in the area can then communicate with the access point to connect to that wired network and the internet.
There are many different versions of the 802.11 standard that use increasingly sophisticated wireless technology to provide higher band width and longer range coverage. The earliest version of Wi-Fi, 802.11 was released in 1997 and allowed communications up to two megabits per second. Two years later, the 802.11b standard, more than quintupled that speed to allow communication at 11 megabits per second. 802.11g, released in 2003, bumped up the maximum bandwidth to an average throughput of 22 megabits per second, while 80.211n, brought a tremendous boost in bandwidth to 600 megabits per second, in 2009, by using special antennas known as multiple input, multiple output or MIMO antennas.
The most recent version of the Wi-Fi standard, 802.11ac, allows communications as speeds over one gigabit per second. One of the important things to remember about Wi-Fi signals is that they are radio transmissions, and as such, they can be picked up by anyone with a suitable antenna and receiver. Unlike wired networks, wireless signals travel out in many different directions. This introduces new security concerns, as network administrators must carefully protect against eavesdropping attacks.
I'll examine some ways to secure wireless networks in the next few videos.
We are a CompTIA Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
- IP addresses
- Routers, switches, and bridges
- VPNs and VPN concentrators
- Network intrusion detection and prevention
- Managing secure networks
- Tuning and configuring SIEMs
- Troubleshooting digital certificates
- Personnel, host, and mobile device security
- Mobile device management and tracking
- Securing common protocols
Skill Level Beginner
1. TCP/IP Suite
2. Network Security Devices
3. Managing Secure Networks
4. Wireless Networking
5. Security and Monitoring Technologies
6. Security Assessment Tools
7. Security Troubleshooting
8. Personnel Security
9. Host Security
10. Mobile Device Security
11. Securing Protocols
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.