Certified Ethical Hacker - CEHv10: Wireless Hacking Common Threats
Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level
Overview/Description
Examine common wireless hacking threats like exploitation of poorly configured devices, deployment of Rogue, Evil Twin and honeypot APs, and MAC filter bypass.
Expected Duration (hours)
0.7
Lesson Objectives
Certified Ethical Hacker - CEHv10: Wireless Hacking Common Threats
it_spceh10tv_32_enus
Expertise Level
Intermediate