Ethical Hacker: Wireless Hacking Common Threats

Ethical Hacker 10    |    Intermediate
  • 2 videos | 42m 46s
  • Includes Assessment
  • Earns a Badge
Examine common wireless hacking threats like exploitation of poorly configured devices, deployment of Rogue, Evil Twin and honeypot APs, and MAC filter bypass, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to identify best practices to add a new network device, compare Rogue APs to Evil Twin APs. You will also recall how to change the MAC Address of a network interface, and execute commands that reveal hidden networks.

WHAT YOU WILL LEARN

  • Compare rogue aps to evil twin aps
    identify best practices when adding a new network device
  • Identify how to change the mac address of a network interface
    identify the commands to reveal hidden networks

IN THIS COURSE

  • Locked
    1.  Wireless Hacking Common Threats
    18m 56s
  • Locked
    2.  Wireless Hacking Common Threats Part 2
    23m 50s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.