Skip to content
Skip to main content

About this free course

Share this free course

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

2.3 Using wireless networking securely

This section is part of the amber and green pathways.

The image shows three internet cables sitting on top of a computer keyboard.
Figure 9

Use the network connection tool on your computer to identify how many wireless networks are within range of your current location.

How many of them use secure connections? If your home wireless network is not configured to use WPA2, find out how to set this up and make sure to do this. The user manual for your wireless router or your internet service provider’s website should have information that will help.

Consider how you connect to the internet when you are on the move. Do you connect to your home Wi-Fi network, your mobile service provider, the free Wi-Fi in a coffee shop?

Go through the online services you identified in Week 1. Which ones would you choose not to access using public wireless networks?