WiFi 802.11 standards, Bluetooth and BLE, cellular generations from 4G to 5G, mesh topologies, and securing wireless infrastructure against real attacks. Text-first, with links to the IEEE specs and every reference video worth your time.
This is a text-first course that links out to the best supporting material on the internet instead of trying to replace it. The goal is to make this the best course on wireless networking you can find — even without producing a single minute of custom video.
Bo builds production networked systems for U.S. federal agencies and has trained 400+ professionals. This course explains how wireless actually behaves in enterprise deployments, not how vendor brochures describe it.
Every day includes practical exercises — configuring WPA3 enterprise auth, analyzing 802.11 frames, and auditing a network for rogue APs. You understand what is actually happening on the air.
Instead of paraphrasing what's in the 802.11 standard, this course links to the relevant spec sections, IEEE working group pages, and the best community write-ups so you can go deep on any topic.
Each day is designed to finish in about an hour of focused reading plus hands-on work. You can do the whole course over a week of lunch breaks. No calendar commitment, no live classes, no quizzes.
Each day stands alone. Read them in order for the full picture, or jump straight to the day that answers the question you have today.
The 802.11 standard family from legacy (a/b/g) through Wi-Fi 6E and 7 (ax/be). How access points advertise SSIDs, how clients associate, channel planning in 2.4 GHz vs 5 GHz vs 6 GHz, and why OFDMA changed throughput at scale.
Bluetooth Classic vs BLE vs Bluetooth 5.x. Zigbee, Z-Wave, and Thread for IoT. NFC for payment and pairing. The real differences between protocols — range, power, throughput, topology — and when each one is the right choice.
How 4G LTE evolved into 5G NR. Carrier aggregation, network slicing, standalone vs non-standalone 5G deployments. The SIM architecture (SIM, eSIM, iSIM). What mmWave actually means for real-world deployments.
How wireless mesh protocols route around failures. IEEE 802.11s mesh mode, spanning tree in wireless bridges, SDN-managed campus wireless. Wi-Fi calling handoffs between cellular and WiFi. Designing coverage for warehouses and campuses.
WPA3 Personal and Enterprise modes. 802.1X authentication with RADIUS and EAP-TLS. Evil-twin and de-authentication attacks — how they work, how to detect them, and how to prevent them. Rogue AP detection and wireless IDS fundamentals.
Instead of shooting our own videos, we link to the best deep-dives already on YouTube. Watch them alongside the course. All external, all free, all from builders who ship this stuff.
Technical walkthroughs of how WiFi works at the frame level — CSMA/CA, beacon frames, association sequences, and channel management across 2.4/5/6 GHz bands.
How 5G New Radio differs from LTE — numerology, massive MIMO, beamforming, network slicing, and standalone vs non-standalone deployments explained by engineers.
Walkthroughs of WPA3 SAE handshake, 802.1X certificate-based auth with FreeRADIUS, and setting up enterprise WiFi with EAP-TLS end-to-end.
How Bluetooth Classic and BLE actually differ — advertising, connection intervals, GATT profiles, and how modern BLE devices like AirTags use the protocol.
Ethical hacking demonstrations of de-authentication attacks, evil-twin access points, and how wireless IDS detects these patterns. Essential context for Day 5.
How modern mesh systems (Eero, Orbi, enterprise mesh) route traffic, handle roaming, and self-heal when nodes fail. Covers both consumer and enterprise deployments.
The best way to understand wireless protocols is to use open-source tools that implement them. These four projects cover packet analysis, security testing, and network management for wireless environments.
The canonical packet analyzer. Capture 802.11 frames in monitor mode, decode 802.1X EAP exchanges, and inspect every field of a Bluetooth HCI packet. No better tool for understanding what wireless protocols actually look like on the wire.
The canonical open-source 802.11 security suite. airodump-ng for passive monitoring, aireplay-ng for deauth testing, airmon-ng for monitor mode setup. Reading the source teaches you exactly how wireless attacks work and how to defend against them.
The most widely deployed open-source RADIUS server, powering 802.1X enterprise WiFi authentication worldwide. Study the EAP module and the authorize/authenticate policy pipeline to understand enterprise wireless security from the inside.
The open-source 802.11 access point daemon that runs inside most Linux-based routers. The WPA3 SAE implementation here is the reference implementation. Reading the 4-way handshake code is the fastest path to understanding WPA authentication.
You manage enterprise networks and need a structured reference that covers WiFi standards, mesh design, and 802.1X security from architecture to implementation.
You're responsible for securing wireless infrastructure and want to understand the real attack surface — deauth attacks, evil twins, rogue APs — and the defenses that work.
You build devices that communicate wirelessly and need to pick the right protocol — BLE vs Zigbee vs Thread vs WiFi — and understand the security implications of each choice.
The 2-day in-person Precision AI Academy bootcamp covers production AI engineering — agents, APIs, deployment — hands-on with Bo. 5 U.S. cities. $1,490. 40 seats max. June–October 2026 (Thu–Fri).
Reserve Your Seat