Wednesday, February 13, 2019

Investigating Wireless Attacks


Investigating Wireless Attacks

In this course you will learn:
1) Investigating Wireless Attacks and video reviews what wireless networks are, wireless terminologies, and wireless standards.
2) We also review types of wireless encryption such as, Temporal Key Integrity Protocol, 128-bit Temporal Key, and WPA Enhances WEP.
3) Cover Wi-Fi chalking, access control attacks, integrity attacks, confidentiality attacks, availability attacks. We wrap up the video with key points to remember.
4) Also reviews the steps for investigation such as, obtaining a search warrant, identifing wireless devices at crime scenes, documenting the scene and maintaining a chain of custody, and detecting wirless connections.
5) How to determine wireless field strength. Along with explaining what spectrum analysis is, how to map wireless zones and hotspots, access point data acquisition and analysis.


No comments:

Post a Comment

Which Python course is best for beginners?

Level Up Your Python Prowess: Newbie Ninjas: Don't fret, little grasshoppers! Courses like "Learn Python 3" on Codecade...