Chapter 16Wireless Attacks, Intrusion Monitoring, and Policy

IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:

  • images Wireless attacks
    • Rogue wireless devices
    • Peer-to-peer attacks
    • Eavesdropping
    • Encryption cracking
    • KRACK attack
    • Authentication attacks
    • MAC spoofing
    • Management interface exploits
    • Wireless hijacking
    • Denial-of-service (DoS) attacks
    • Vendor-specific attacks
    • Social engineering
  • images Intrusion monitoring
    • Wireless intrusion prevention system (WIPS)
    • Rogue detection and mitigation
    • Spectrum analyzers
  • Wireless security policies
    • General security ...

Get CWNA Certified Wireless Network Administrator Study Guide, 5th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.