Chapter 9. Wireless LAN Security Auditing
IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:
WLAN security audit
OSI Layer 1 audit
OSI Layer 2 audit
Penetration testing
Wired infrastructure audit
Social engineering audit
WIPS audit
Documenting the audit
Audit recommendations
WLAN security auditing tools
Linux-based tools
Windows-based tools
These changes may directly affect the security posture of the WLAN. The users of a WLAN will often complain if the network becomes "slow" or "unavailable," but will not complain about security holes because they do not know how to look for them. Users only care about their ability to access resources and do their jobs. ...
Get CWSP® Certified Wireless Security Professional Official: Study Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.