Part 1:
Research the different types of wireless access point and bridge equipment available. Price different options from different manufacturers. Then, research the security of these devices. How many have vulnerabilities in a CVE database?
Part 2:
Research what types of electronic devices or other obstacles can cause interferences.