CEH v11: Wireless Hacking & Countermeasures

Ethical Hacker v11    |    Intermediate
  • 2 videos | 43m 9s
  • Includes Assessment
  • Earns a Badge
Rating 4.9 of 15 users Rating 4.9 of 15 users (15)
There are a few common attack vectors when targeting Wi-Fi networks that you should be aware of. In this course, you'll learn how to perform wireless hacking attacks such as MAC spoofing, de-authentication, and WPA/2 encryption cracking. Defending wireless networks can be a daunting task if you're unaware of effective security countermeasures. To complete this course, you'll explore common security controls that will get you on the right track to keeping your wireless network safe. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • Recognize how to perform wi-fi hacking
    identify how to perform de-authorization attacks against wi-fi connected devices
    describe the components for cracking a wpa/wpa2 wireless shared key
    identify the tools required to crack wpa/wpa2 encryption
  • Describe common security controls that will help keep wireless networks safe
    describe common security controls that can protect access points
    describe how common security controls like security audits can help protect wireless networks

IN THIS COURSE

  • Locked
    1.  Wireless Hacking
    22m 28s
    Upon completion of this video, you will be able to describe the components needed to crack a WPA/WPA2 wireless shared key. FREE ACCESS
  • Locked
    2.  Wireless Hacking Countermeasures
    20m 41s
    Upon completion of this video, you will be able to describe common security controls that will help keep wireless networks secure. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 20 users Rating 4.8 of 20 users (20)
Rating 4.7 of 60 users Rating 4.7 of 60 users (60)
Rating 4.7 of 24 users Rating 4.7 of 24 users (24)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 17 users Rating 4.8 of 17 users (17)
Rating 4.7 of 24 users Rating 4.7 of 24 users (24)
Rating 4.8 of 26 users Rating 4.8 of 26 users (26)