• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Ethical Hacking-Hacking Wireless Networks, By Dale Meredith

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,623
Solutions
2
Reputation
32
Reaction score
100,456
Points
2,313
Credits
32,750
‎6 Years of Service‎
 
76%
screenshot-9681.png


What you'll learn

Pluralsight is not an official partner or accredited training center of EC-Council. Great! You have just finished setting up your wireless network. You did everything you were suppose to, like giving your SSID a unique name and securing your network with a strong password, so that someone can't piggyback off your network. Now that you are "safe and secure," you don't have to worry about hackers right? SLOW DOWN there skippy. While you have taken the "basic" steps required, you still need to be aware of some hacking methods that can be used to gain access to your network, despite your precautions. You also need to be very wary whenever you are accessing the network that is not your own, and let's not forget about other wireless technology; Bluetooth. This course is part of the Ethical Hacking Series.
This link is hidden for visitors. Please Log in or register now.


Table of contents
Insights into Wireless
Encryption in Wireless
Threats from Wireless
The Methodology of Hacking Wireless
Hacking Bluetooth
Countermeasures
About the autho

Code:
https://www.pluralsight.com/courses/ethical-hacking-wireless-networks
To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top