In the last module, we discussed the different wireless attacks that can be conducted on a wireless network. We talked about attacks such as rogue access points, jamming, evil twins, and Bluetooth attacks, among others. In previous modules, we discussed how to harden networks and hosts against the different types of attacks that they can be subjected to. It’s just as important to harden wireless access points and clients as well, to reduce the risk and effectiveness of wireless attacks.
In this module, we’ll talk about hardening wireless networks. We’ll discuss how to configure wireless access points and hosts securely, by locking down wireless protocols, using authentication methods, and other configuration items. ...