Christopher Govender
Skillsoft issued completion badges are earned based on viewing the percentage required or receiving a passing score when assessment is required. Wireless technologies abound in today's networks, making them a prime target for attack.
In this course, you'll explore the features of Wi-Fi, common standards, authentication types, antennas, and encryption schemes. Next, you'll examine common threats against wireless technologies that you need to be aware of to be an effective security professional, including authentication attacks, evil twins, rogue access point (rogue AP), and denial-of-service (DoS). To complete this course, you'll learn about commonly used wireless hacking tools, including those used for discovery, mapping, traffic analysis, and wireless attacks.
This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.
Issued on
November 10, 2024
Expires on
Does not expire