Ethical Hacker: Wireless Hacking Common Threats
Ethical Hacker 10
| Intermediate
- 2 Videos | 42m 46s
- Includes Assessment
- Earns a Badge
Examine common wireless hacking threats like exploitation of poorly configured devices, deployment of Rogue, Evil Twin and honeypot APs, and MAC filter bypass, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to identify best practices to add a new network device, compare Rogue APs to Evil Twin APs. You will also recall how to change the MAC Address of a network interface, and execute commands that reveal hidden networks.
WHAT YOU WILL LEARN
-
compare Rogue APs to Evil Twin APsidentify best practices when adding a new network device
-
identify how to change the MAC Address of a network interfaceidentify the commands to reveal hidden networks
IN THIS COURSE
-
1.Wireless Hacking Common Threats18m 56s
-
2.Wireless Hacking Common Threats Part 223m 50s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.