CCOG for CIS 189 archive revision 202504

You are viewing an old version of the CCOG. View current version »

Effective Term:
Fall 2025

Course Number:
CIS 189
Course Title:
Wireless Security
Credit Hours:
4
Lecture Hours:
30
Lecture/Lab Hours:
0
Lab Hours:
30

Course Description

Introduces wireless technologies, standards, and typical designs and topologies found in organizations of various sizes. Covers wireless security considerations, including secure configuration of wireless LANs, wireless access points, troubleshooting, and development of wireless security policies. Audit available.

Intended Outcomes for the course

Upon successful completion of the course, students should be able to:

  1. Describe a variety of wireless technologies and their respective security considerations.

  2. Compare and contrast common Wi-Fi standards and wireless network topologies.

  3. Perform a Wi-Fi site survey.

  4. Design and configure wireless LANs with security in mind.

  5. Secure a wireless access point.

  6. Analyze the wireless security needs of a small or large organization and develop a wireless security policy.

Course Activities and Design

This course is presented by means of lecture/discussion sessions, assignments, exams, and lab projects.

Outcome Assessment Strategies

Students will take quizzes, participate in discussions, and complete assignments which may include hands-on lab work in a virtual environment.

Course Content (Themes, Concepts, Issues and Skills)

Outcome: Discuss a variety of wireless technologies and their respective security considerations.

  • Wi-Fi technologies and security
  • IP mobility
  • Wireless technologies other than Wi-Fi, such as cell system, RFID/NFC, Bluetooth, IR, microwave
  • Underlying concepts such as the frequency spectrum, encoding techniques, multiplexing (space-division, time-division, frequency-division, code-division, etc.)
  • How FHSS, DSSS, and OFDM technologies originally attempted to provide security

Outcome: Contrast common Wi-Fi standards and wireless network topologies.

  • ISM unlicensed spectrum
  • 802.11 standards
  • 802.11 service sets
  • Use of DHCP

Outcome: Perform a Wi-Fi site survey.

  • Radio Frequency coverage analysis
  • Sources of interference
  • Troubleshooting wireless networks

Outcome: Design and configure wireless LANs with security in mind.

  • Selecting appropriate wireless technologies
  • Troubleshooting connectivity and security issues
  • Ipconfig commands
  • Resetting equipment from the outside in
  • Setting up and troubleshooting wireless printers

Outcome: Secure a wireless access point.

  • Configure with appropriate encryption
  • Troubleshooting connectivity and security issues
  • Configure DHCP

Outcome: Analyze the wireless security needs of a small or large organization and develop a wireless security policy.

  • Security training and education
  • BOYD (bring your own device) policies
  • Segmenting wireless users
  • Managing wireless devices