Certified Ethical Hacker - CEHv10: Wireless Hacking Common Threats


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Examine common wireless hacking threats like exploitation of poorly configured devices, deployment of Rogue, Evil Twin and honeypot APs, and MAC filter bypass, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to identify best practices to add a new network device, compare Rogue APs to Evil Twin APs. You will also recall how to change the MAC Address of a network interface, and execute commands that reveal hidden networks.

Expected Duration (hours)
0.7

Lesson Objectives

Certified Ethical Hacker - CEHv10: Wireless Hacking Common Threats

  • compare Rogue APs to Evil Twin APs
  • identify best practices when adding a new network device
  • identify how to change the MAC Address of a network interface
  • identify the commands to reveal hidden networks
  • Course Number:
    it_spceh10tv_32_04_enus

    Expertise Level
    Intermediate