Detect rogue wireless AP's including (DF'ing) Direction Finding of said connection devices
Attempts at gaining access to wireless networks through compromising vulnerabilities in the wireless infrastructure to gain unauthorized access to networks and systems
Assessment of the diagrams of wireless networks and protocols surrounding them for security efficacy and potential vulnerabilities
Assessment of policies and procedures pertaining to wireless networking. Conducting a gap analysis of those policies and procedures for best practices