In this course you will learn:
1) Investigating
Wireless Attacks and video reviews what wireless networks are, wireless
terminologies, and wireless standards.
2) We also review types of wireless encryption such as, Temporal Key Integrity Protocol, 128-bit Temporal Key, and WPA Enhances WEP.
3) Cover Wi-Fi chalking, access control attacks, integrity attacks, confidentiality attacks, availability attacks. We wrap up the video with key points to remember.
4) Also reviews the steps for investigation such as, obtaining a search warrant, identifing wireless devices at crime scenes, documenting the scene and maintaining a chain of custody, and detecting wirless connections.
5) How to determine wireless field strength. Along with explaining what spectrum analysis is, how to map wireless zones and hotspots, access point data acquisition and analysis.
2) We also review types of wireless encryption such as, Temporal Key Integrity Protocol, 128-bit Temporal Key, and WPA Enhances WEP.
3) Cover Wi-Fi chalking, access control attacks, integrity attacks, confidentiality attacks, availability attacks. We wrap up the video with key points to remember.
4) Also reviews the steps for investigation such as, obtaining a search warrant, identifing wireless devices at crime scenes, documenting the scene and maintaining a chain of custody, and detecting wirless connections.
5) How to determine wireless field strength. Along with explaining what spectrum analysis is, how to map wireless zones and hotspots, access point data acquisition and analysis.
No comments:
Post a Comment