Examine common wireless hacking threats like exploitation of poorly configured devices, deployment of Rogue, Evil Twin and honeypot APs, and MAC filter bypass.
Certified Ethical Hacker - CEHv10: Wireless Hacking Common Threats