March 2026
Intermediate to advanced
400 pages
15h 45m
English
A security audit follows many of the same steps as a risk assessment. The difference is that a security audit looks for proof that best practices and procedures were followed. In many cases, these audits are internal. However, the same person or team who performed the risk assessment should not carry out a security audit.
An auditor conducting a security audit for WLAN security vulnerabilities should look at the following points (in addition to those items examined on a wired network):
Read now
Unlock full access