wird in neuem Tab geöffnet
E-Medium
Ethical Hacking: Wireless Networks
Verfasser:
Suche nach diesem Verfasser
Shore, Malcolm (Verfasser)
Mehr...
Jahr:
2016
Verlag:
LinkedIn
Mediengruppe:
EMedien
Vorbestellbar:
Ja
Nein
Voraussichtlich entliehen bis:
Download
Zum Download von externem Anbieter wechseln - wird in neuem Tab geöffnet
Standorte | Status | Vorbestellungen | Frist |
Standorte:
|
Status:
Verfügbar
|
Vorbestellungen:
0
|
Frist:
|
Wireless networks are convenient and popular, but poor configuration and encryption leave them open to attack. Hackers can use Wi-Fi vulnerabilities to infiltrate your entire network. Security professionals need to know how to detect, prevent, and counter these kinds of attacks using the latest tools and techniques-the subject of this course with cybersecurity expert Malcolm Shore. Malcolm covers everything from configuring basic security to understanding how hackers extract passwords, harvest connections at rogue access point, and attack networks via Bluetooth. He also explains how to select the right antennae for testing and introduces some sophisticated Windows and Linux tools to scan for vulnerabilities, including Acrylic, Ekahau, and Wireshark. By the end of the course, you should be able to shore up your wireless connections and gain confidence that your local network is safe to use. Note: This course is part of our test prep series for the Certified Ethical Hacker exam. Review the complete exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
Keine Rezensionen gefunden.
Mehr...
Jahr:
2016
Verlag:
LinkedIn
Aufsätze:
Zu diesem Aufsatz wechseln
Suche nach dieser Systematik
Suche nach diesem Interessenskreis
Beschreibung:
01:41:36.00
Suche nach dieser Beteiligten Person
Sprache:
Englisch
Mediengruppe:
EMedien