March 2026
Intermediate to advanced
400 pages
15h 45m
English
While the expanded principles of information security are good in a general sense, they are not very instructive regarding the day-to-day protection of mobile and wireless clients, devices, and networks. This section looks at some specific threats, which are broken into three categories:
These categories will have some overlap, but they cover the full breadth of known threats.
Before looking at specific mobile and Wi-Fi threats, it’s important to remember that virtually every threat that exists on wired networks also exists on wireless and mobile networks. In addition, some threats are specific to wireless and mobile or now have wireless and mobile variants. This ...
Read now
Unlock full access