MODULE 30

Wireless Hardening

In the last module, we discussed the different wireless attacks that can be conducted on a wireless network. We talked about attacks such as rogue access points, jamming, evil twins, and Bluetooth attacks, among others. In previous modules, we discussed how to harden networks and hosts against the different types of attacks that they can be subjected to. It’s just as important to harden wireless access points and clients as well, to reduce the risk and effectiveness of wireless attacks.

In this module, we’ll talk about hardening wireless networks. We’ll discuss how to configure wireless access points and hosts securely, by locking down wireless protocols, using authentication methods, and other configuration items. ...

Get Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.