From the course: Ethical Hacking: Wireless Networks

Learn how to protect your wireless network - Linux Tutorial

From the course: Ethical Hacking: Wireless Networks

Learn how to protect your wireless network

- [Malcolm Shaw] Wireless networks are now a part of life for everyone at home, in business, and in the government. Wireless connectivity has enabled on the go access to everything from social media sites to enterprise applications, allows home users to use their laptops in and around the house at will, and offers convenient guest access to businesses. However, the use of a wireless network isn't without its hazards, and ensuring that home and business use of wireless is secure is the job of the wireless network tester. Understanding the risks also helps us make informed judgments about the use of public wifi hotspots. I'm Malcolm Shaw, and I've spent a career helping governments and businesses protect their systems against cyber attacks. In this course, I'll explain the technology used in wireless networks and the risks it brings, which protocols are vulnerable to attack, and the tools available to test for vulnerable services. I'll start by explaining the basics of wireless networking and the various forms of wireless network security. I'll demonstrate the basic Windows and Linux tool sets for wireless network testing, and I'll be using the WiFi Pineapple to cover the issue of rogue access points. When you finish this course you'll have a great understanding of how to test for wireless network weaknesses. Now let's get started with wireless testing.

Contents