March 2026
Intermediate to advanced
400 pages
15h 45m
English
Cybercriminals tend to seek out weak points that they discover in a network infrastructure or in a device’s hardware or OS. The weak points in a wireless network relate to the association and authentication of devices. In a wired network, much of this can be taken for granted, because a physical connection is required via a cable and switch. With a wireless network, this is not the case. Any device on the same 2.4 GHz, 5 GHz or 6 GHz channel can listen, perhaps negotiate an association, and join the network.
In the early days of 802.11, wireless networks were easy to penetrate because encryption was weak, and people didn’t understand best practices. Today, IT departments have good standards and better tools ...
Read now
Unlock full access