Table of Contents
- Understand wireless networks (in)security and risks
- Plan your lab environment
- Configuring network lab components
- Designing Application lab components
- Implementing security mechanisms
- Explore hacking toolkits
- Prepare wireless penetration testing platform
- What?s next?

