• Online, Self-Paced
Course Description

Examine common wireless hacking threats like exploitation of poorly configured devices, deployment of Rogue, Evil Twin and honeypot APs, and MAC filter bypass.

Learning Objectives

Certified Ethical Hacker - CEHv10: Wireless Hacking Common Threats

  • recognize common threats against wireless networks like exploiting poorly configured devices, deploying Rogue APs, Evil Twin APs, Ad-hoc connections, and honeypot APs
  • recognize more complex wire network attacks such as MAC filter bypass by MAC spoofing and revealing hidden wireless networks

Framework Connections

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.