8. Gaining Access - Security & Mitigation 2. How to Configure Wireless Security Settings To Secure Your Network