This document discusses a layered approach to securing wireless communications. It covers 6 layers: Layer 0 discusses why security matters and risks like rogue access points and data loss. Layer 1 covers securing the physical and wireless environment. Layer 2 focuses on protecting data by securing the 802.11 protocol, authenticating devices and users, and encrypting traffic. Layer 3 is about securing the network layer through segmentation, application control, and role-based access policies. Layer 4 involves securely managing the network through monitoring, configuration control, and user access management. Finally, Layer 5 discusses auditing activities, configurations, and keeping records to ensure compliance.