CEH v11: Wireless Concepts, Threats & Hacking Tools
Ethical Hacker v11 | Intermediate
- 3 Videos | 1h 4m 42s
- Includes Assessment
- Earns a Badge
Wireless technologies abound in today's networks, making them a prime target for attack. In this course, you'll explore the features of Wi-Fi, common standards, authentication types, antennas, and encryption schemes. Next, you'll examine common threats against wireless technologies that you need to be aware of to be an effective security professional, including authentication attacks, Evil Twins, Rogue AP, and Denial of Service. To complete this course, you'll learn about commonly used wireless hacking tools, including those used for discovery, mapping, traffic analysis, and wireless attacks. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
recognize the common Wi-Fi standardsdescribe the Wi-Fi authentication typesidentify the types of Wi-Fi antennasrecognize the features of the Wi-Fi encryption schemesdescribe threats to wireless technologies
recognize the Rogue AP threat to wireless technologiesidentify threats to wireless technologies used by attackersidentify tools that help with wireless discovery and mappingrecognize tools used for doing wireless attacksuse tools to do wireless discovery, mapping, traffic analysis and attacks
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.