How easy would it be for a bad guy to pose as a legitimate wireless network? In this video, you’ll learn how rogue access points and evil twins can be used to infiltrate legitimate wireless networks.
MAC address filtering can provide you with some additional control over wireless network access. In this video, you’ll learn about the fundamentals of MAC filtering and how it can be configured in your access point.
Adding a new wireless access point to your office requires the consideration of many different variables. In this video, you’ll learn how to place your wireless access point into the optimal location.
In this video, you’ll learn how to identify wireless interference and some techniques you can use to minimize the amount of wireless interference on your network.
An extra access point connected to your network creates a serious security concern. In this video, you’ll learn about the dangers of rogue access points and how the bad guys can watch you with their evil twins.
The security of the network is a never-ending struggle against the bad guys. In this video, you’ll learn about the most common security threats and what you can do to protect your network resources. We’ll discuss denial of service attacks, viruses, worms, man in the middle attacks, rogue access points, social engineering, and phishing. We’ll also show you how policies and procedures, user training, and patching can help mitigate these security problems in your network.
Implementing a wireless network into a large environment can be a challenging exercise. In this video you’ll learn the basics of installing wireless clients, placing access points, configuring the access point software, and verifying the installation.