Day 2

Secure Wireless Access

Key Topics

A wireless local area network (WLAN) is open to anyone within range of a wireless access point (AP) and the appropriate credentials to associate to it. Today, we review the methods for securing wireless access.

Wireless Attacks and Security

Attacks on wireless networks can originate from a variety of sources, including outsiders and disgruntled employees, or they can even occur accidentally. These networks face several specific threats, including the following:

  • Data interception

  • Unauthorized users trying to ...

Get 31 Days Before your Cisco Certified Support Technician (CCST) Networking 100-150 Exam: A Day-By-Day Review Guide for the CCST-Networking Certification Exam now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.