I've been given a task of doing research for some tools/methods of accomplishing the following goals:
The engineers will scan the 802.11-based signal cloud around your network testing for ways that outsiders could eavesdrop on your wireless communications, break authentication or cryptographic protocols, or impersonate elements of your wireless infrastructure.
Please note, I am new to the field of IT security in terms of practicing and researching exploits, so it would be the most helpful if you could be point me in the right direction i.e. links to good Youtube videos, reccomend books/blogs for this particular taksing, and particular tools to use.
Thanks in advance