Ethical Hacker: Wireless Hacking Common Threats
Ethical Hacker 10
| Intermediate
- 2 videos | 42m 46s
- Includes Assessment
- Earns a Badge
Examine common wireless hacking threats like exploitation of poorly configured devices, deployment of Rogue, Evil Twin and honeypot APs, and MAC filter bypass, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to identify best practices to add a new network device, compare Rogue APs to Evil Twin APs. You will also recall how to change the MAC Address of a network interface, and execute commands that reveal hidden networks.
WHAT YOU WILL LEARN
-
Compare rogue aps to evil twin apsidentify best practices when adding a new network device
-
Identify how to change the mac address of a network interfaceidentify the commands to reveal hidden networks
IN THIS COURSE
-
18m 56s
-
23m 50s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.