Ethical Hacking: Wireless Networks.
(Online Course)

Book Cover
Average Rating
Published
Carpenteria, CA linkedin.com, 2016.
Format
Online Course
Status

Description

Loading Description...

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

More Details

Language
English

Notes

General Note
10/17/201612:00:00AM
Participants/Performers
Presenter: Malcolm Shore
Description
IT security professionals: Learn how to identify and repair vulnerabilities in your wireless networks. This course is part of our Certified Ethical Hacker test prep series.
Description
Wireless networks are convenient and popular, but poor configuration and encryption leave them open to attack. Hackers can use Wi-Fi vulnerabilities to infiltrate your entire network. Security professionals need to know how to detect, prevent, and counter these kinds of attacks using the latest tools and techniques—the subject of this course with cybersecurity expert Malcolm Shore. Malcolm covers everything from configuring basic security to understanding how hackers extract passwords, harvest connections at rogue access point, and attack networks via Bluetooth. He also explains how to select the right antennae for testing and introduces some sophisticated Windows and Linux tools to scan for vulnerabilities, including Acrylic, Ekahau, and Wireshark. By the end of the course, you should be able to shore up your wireless connections and gain confidence that your local network is safe to use. Note: This course is part of our test prep series for the Certified Ethical Hacker exam. Review the complete exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
System Details
Latest version of the following browsers: Chrome, Safari, Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScript and cookies must be enabled. A broadband Internet connection.

Citations

APA Citation, 7th Edition (style guide)

Shore, M. (2016). Ethical Hacking: Wireless Networks . linkedin.com.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Shore, Malcolm. 2016. Ethical Hacking: Wireless Networks. linkedin.com.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Shore, Malcolm. Ethical Hacking: Wireless Networks linkedin.com, 2016.

MLA Citation, 9th Edition (style guide)

Shore, Malcolm. Ethical Hacking: Wireless Networks linkedin.com, 2016.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.