Students investigate wireless standards and vulnerabilities, analyzing the handshake process and proposing secure enterprise deployments.

Similar Lessons