Dive into the world of #LoRaWAN with @troymart and Raymond Hendrix. Learn the theory behind this incredible wireless IoT protocol, then get some lab time when setting up your gateway and connecting sensors.
You can register for this hands-on boot camp at #WLPC Prague 2023. Registration opens August, 15.
https://www.thewlpc.com/conferences/prague-czech-republic-2023
Tuesday 2/28, Wes Purvis, @subnetwork and I are continuing the #WLPC dialog with Wi-Fi 6E, WPA3 security, migrations, the real deal with MPSK, plus how to make Enhanced Open reliable. Join us with Juniper Networks live !
SECURE WI-FI DESIGN https://www.juniper.net/us/en/forms/best-practices-for-secure-wifi-design.html
#wlpc #wifi #securewifi #wpa3 #wifi6e #owe #security
Do you want to know HOW (and WHY) to upgrade to the latest Wi-Fi security??
My talk on Wi-Fi WPA3 Security and Migrations from #WLPC is online! It was unintentionally delivered without slides, but I think we all did just fine without them. Just 25 minutes.
My talk on Wi-Fi WPA3 Security and Migrations from #WLPC is online! It was unintentionally delivered without slides, but I think we did 'aight sans-slides.
https://www.youtube.com/watch?v=Q2iHW7bupxA
Thanks to everyone for making #wlpc amazing! I was honored to give a full conference talk on WPA-3 migrations and host a hands on deep dive training for Secure Wi-Fi Design. More recaps coming!
#OpenIntent schema for describing the data needed to deploy #WiFi access points is announced at #WLPC by Jake Snyder
#GoogleOpenSource
This is your chance to contribute. Starting Feb 20th - community meetings begin…
https://groups.google.com/g/openintent-wifi
#googleopensource #wlpc #wifi #openintent
I tend to doodle while taking notes. I call this one an Ode to #WLPC 2023.
#digitalArt
#doodles
Taking the stage to present on how to do #WPA3 security migrations is @jjx at #WLPC.
Also, the author of “Wireless Security Architecture” available👇
https://www.amazon.ca/dp/B09V445PJ9?ref_=cm_sw_r_mwn_dp_Z5DEW2ABWF5V4NPD4PH9
Practice your troubleshooting skills by triaging two random non-working things that could break #WiFi.
Roll 2d20
1. DNS
3. Co-channel interference (CCI)
4. Secondary coverage (overlap)
5. Passphrase
6. 802.1X/RADIUS
7. Firmware
8. DFS
9. NTP
10. Auto-RF/RRM
11. DHCP
12. DNS
13. Certificates
14. VLAN
15. QoS
16. Captive Web Portal (CWP)
17. MAC randomization
18. Contention
19. Tunnels
20. DNS
#WLPC