Ethical Hacker: Wireless Hacking Common Threats
Ethical Hacker 10 | Intermediate
- 2 Videos | 42m 46s
- Includes Assessment
- Earns a Badge
Examine common wireless hacking threats like exploitation of poorly configured devices, deployment of Rogue, Evil Twin and honeypot APs, and MAC filter bypass, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to identify best practices to add a new network device, compare Rogue APs to Evil Twin APs. You will also recall how to change the MAC Address of a network interface, and execute commands that reveal hidden networks.
WHAT YOU WILL LEARN
compare Rogue APs to Evil Twin APsidentify best practices when adding a new network device
identify how to change the MAC Address of a network interfaceidentify the commands to reveal hidden networks
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.