O'Reilly logo

CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, 3rd Edition by Matt Walker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 7

Wireless Network Hacking

In this chapter you will

•  Describe wireless network architecture and terminology

•  Identify wireless network types and forms of authentication

•  Describe wireless encryption algorithms

•  Identify wireless hacking methods and tools

•  Describe mobile platform attacks

•  Identify Mobile Device Management

Some people like love stories, some like mysteries, and some prefer watching explosions and gunfire in action movies. As for me, I am a certified horror movie nut. I love watching movies about monsters, ghosts, spooks, blood, and gore—just plain-old scarefests. One that got to me quite a bit when I was younger—even though it’s not really thought of as a true horror movie, I guess—was Poltergeist. And it ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required