• Online, Self-Paced
Course Description

Examine common wireless hacking threats like exploitation of poorly configured devices, deployment of Rogue, Evil Twin and honeypot APs, and MAC filter bypass.

Learning Objectives

Certified Ethical Hacker - CEHv10: Wireless Hacking Common Threats

  • recognize common threats against wireless networks like exploiting poorly configured devices, deploying Rogue APs, Evil Twin APs, Ad-hoc connections, and honeypot APs
  • recognize more complex wire network attacks such as MAC filter bypass by MAC spoofing and revealing hidden wireless networks

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Operations
  • Cybersecurity Management
  • Exploitation Analysis
  • Threat Analysis
  • Vulnerability Assessment and Management