Continuation of part 1 - The use of wireless devices to access the Internet has become ubiquitous. The security of these devices has improved considerably since the advent of the first encryption protocol, the poorly named Wireless Equivalent Privacy (WEP), which was very weak and easily broken. Even with the contemporary protocols, devices remain vulnerable to focused attacks if not properly configured. This presentation is geared as a basic introduction into wireless security. The presentation will cover: • A basic overview of WEP & WPA/WPA2 • Open source tools for testing WiFi • Hardware including antennas & network cards • Live attack demonstrations • Countermeasures & proper configurations Easy to follow step-by-step materials will be provided for anyone who is interested in following along!