Rogue Wireless

Detect rogue wireless AP's including (DF'ing) Direction Finding of said connection devices

Wireless Penetration Testing

Attempts at gaining access to wireless networks through compromising vulnerabilities in the wireless infrastructure to gain unauthorized access to networks and systems

Wireless Architecture Assessment

Assessment of the diagrams of wireless networks and protocols surrounding them for security efficacy and potential vulnerabilities

Wireless Policies and Procedures Assessment

Assessment of policies and procedures pertaining to wireless networking. Conducting a gap analysis of those policies and procedures for best practices