25.8.14
This website uses cookies to ensure you get the best experience on our website. Learn more

Ethical Hacker: Wireless Hacking Common Threats

Jeremiah Spencer

Skillsoft issued completion badges are earned based on viewing the percentage required or receiving a passing score when assessment is required. Examine common wireless hacking threats like exploitation of poorly configured devices, deployment of Rogue, Evil Twin and honeypot APs, and MAC filter bypass, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to identify best practices to add a new network device, compare Rogue APs to Evil Twin APs. You will also recall how to change the MAC Address of a network interface, and execute commands that reveal hidden networks.

Issued on

August 5, 2022

Expires on

Does not expire