Skill

Identify WLAN Threats and Exploits

July 2023 with Jeff Kish

  • 7 videos
  • 1 hr
Join Jeff Kish to explore and identify common threats and exploits used in wireless networks, including eavesdropping, cracking, WPA vulnerabilities, Man-in-the-Middle attacks, Evil Twin, and Social Engineering techniques such as Phishing.

Recommended Experience
  • 1 to 2 years Archives
Related Job Functions
  • Any
Jeff Kish has over 15 years of IT experience, focusing mainly on core infrastructure and data center technologies. He holds a number of Cisco certifications, including CCIEs in Routing and Switching and Data Center. He also focuses on network programmability and software-defined networking.
Get started
Jeff Kish
Jeff Kish
Trainer

Quizzes & Practice Exams

Reinforce core concepts and new skills with built-in quiz questions, and exams.

Virtual Labs

Explore new technology and apply your expertise in customized virtual labs.

Accountability Coaching

Define your goals and stick to a training plan with help from our coaches.

Learn this skill and so much more!

Get started

Gain instant access to our entire IT training library, free for your first week. Train anytime on your desktop, tablet, or mobile devices.

Not sure where to start?
Call 541-284-5522 or try our .

What is it like to train with us?

Our learners say it best.

Helps me learn the skills I need when I need them

THOMAS S. | SYSTEMS ENGINEER & CONSULTANT
Read Reviews
Get CBT Nuggets IT training news and resources

I have read and understood the privacy policy and am able to consent to it.

© 2024 CBT Nuggets. All rights reserved.Terms | Privacy Policy | Accessibility | Sitemap | 2850 Crescent Avenue, Eugene, OR 97408 | 541-284-5522