The configuration of your wireless access point can have a dramatic impact on throughput and performance. In this video, you’ll learn about SSID configurations, encryption settings, power levels, LWAPP, environmental factors, and issues with wireless standards.
How easy would it be for a bad guy to pose as a legitimate wireless network? In this video, you’ll learn how rogue access points and evil twins can be used to infiltrate legitimate wireless networks.
The security of the network is a never-ending struggle against the bad guys. In this video, you’ll learn about the most common security threats and what you can do to protect your network resources. We’ll discuss denial of service attacks, viruses, worms, man in the middle attacks, rogue access points, social engineering, and phishing. We’ll also show you how policies and procedures, user training, and patching can help mitigate these security problems in your network.