February 2018
Intermediate to advanced
396 pages
9h 38m
English
This chapter was a useful explanation of how to compromise networks by exploiting layer 2 weaknesses. The next chapter will be an in-depth learning experience that explains how to exploit Voice over IP systems.