MODULE 30

Wireless Hardening

In the last module, we discussed the different wireless attacks that can be conducted on a wireless network. We talked about attacks such as rogue access points, jamming, evil twins, and Bluetooth attacks, among others. In previous modules, we discussed how to harden networks and hosts against the different types of attacks that they can be subjected to. It’s just as important to harden wireless access points and clients as well, to reduce the risk and effectiveness of wireless attacks.

In this module, we’ll talk about hardening wireless networks. We’ll discuss how to configure wireless access points and hosts securely, by locking down wireless protocols, using authentication methods, and other configuration items. ...

Get Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401) now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.