Our wireless networks wouldn’t be very useful if we weren’t able to protect our data. In this video, you’ll learn which encryption types to use and which ones to avoid.
We relay on wireless security technologies to keep our network communication secure. In this video, you’ll learn about WEP, WPA, WPA2, and MAC filtering.
How secure are our wireless protocols? In this video, you’ll learn about replay attacks, cracking WEP encryption, WPA2 encryption, and WPS vulnerabilities.
There are many hash functions for many different circumstances. In this video, you’ll learn about MD5, SHA, RIPEMD, and HMAC hash functions.
802.11 networks rely on encryption to ensure the security of all wireless traffic. In this video, you’ll learn about WEP and WPA encryption and the dangers of using the wrong encryption on your wireless network.
Flaws in WEP encryption were exploited using a series of replays and very specific cryptographic attacks. In this video, you’ll learn the process that the bad guys used to break WEP encryption.
Without encryption, our wireless networks would be relatively useless. In this video, you’ll get an overview of wireless encryption with WEP, WPA, and WPA2.
An insecure network is an open door to misuse. In this video, you’ll learn ways to help secure your wired and wireless networks.
Our wireless networks would be worthless if they didn’t include complex encryption methods. In this video, you’ll learn about the WEP, WPA, and WPA2 encryption protocols.
Why is WPA encryption preferred over WEP?