Certified Ethical Hacker - CEHv10: Wireless Hacking Common Threats


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Examine common wireless hacking threats like exploitation of poorly configured devices, deployment of Rogue, Evil Twin and honeypot APs, and MAC filter bypass.



Expected Duration (hours)
0.7

Lesson Objectives

Certified Ethical Hacker - CEHv10: Wireless Hacking Common Threats

  • recognize common threats against wireless networks like exploiting poorly configured devices, deploying Rogue APs, Evil Twin APs, Ad-hoc connections, and honeypot APs
  • recognize more complex wire network attacks such as MAC filter bypass by MAC spoofing and revealing hidden wireless networks
  • Course Number:
    it_spceh10tv_32_enus

    Expertise Level
    Intermediate