7 hours 6 minutes
Hey, everyone, welcome back to the course in this video. Where to go over a brief introduction toe wireless communication. So we'll talk about the 802.11 standard and some of the sub standards. We'll also talk about the advantages and disadvantages of WiFi as well as, well, talk about the different types of wireless encryption.
So these are the 802.11 standards. The main ones you wanna keep an eye on for the CH exam in particular are gonna be the 802.11 and is a Nancy and the 802.11 e. Some other standards you'll probably want to know for the examination
are gonna be some of the Bluetooth in zig B one. So, for example, the Bluetooth
gonna be 802.15 dot one and then zig b is 802.15 dot four.
So what are some of the advantages of wireless?
Well, number one fast installation, I can quickly set up a wireless access point and get my team up to speed. A Sfar is getting a connection that they need,
whereas if I was doing traditional running cables. I may either I have a team that does that, or I may have to outsource that. Depending on the size of my organization, it might be something that outsource. So then I have to wait on that company being available. The technician coming out hope they come out on time,
so it's just faster. We can literally just take a wireless access point, get it connected, give the right people access to it and add more people as we need elasticity. Because instead of me running running cables all day long and then deciding well, I don't really need that extra 10 people. We've got to do some cutbacks. Now. I've got all this extra cable run in the office,
whereas with wireless access point,
let's say that a remote sales team comes in from out of town, and so they're at the corporate headquarters. I can quickly spin up environment just for them, and I don't have to worry about running new cables or anything. And then, as they when they leave to go back to their remote location, I can then just scale it back down again by removing that wireless access point
and cost savings it costs a lot less just to spin up a couple of routers than it does to run the cable, make sure the cables working whatever cable goes out. So there's a lot of issues involved with that physical cabling we used to dio
and granted. We still do it, but we can use wireless to really scale up our organizations. Without that additional cost
and range, my employees could literally be anywhere in the world. They can also be in remote locations outside the office so they could be in the parking lot is still get access, whereas with a traditional cable, unless I run it out the window or the front door, they're not gonna be able to access the Internet. But with a wireless, I can allow them to do so.
So what are some disadvantages of wireless? Well, some of the main ones are gonna be security, because at the end of the day, the wireless device may or may not be secure enough to keep someone from breaking in. Also, bandwidth issues right? If too many people are on that WAP, then
it might be issues of availability of the data. It might be issues just with the band with itself as faras speed of accessing that data speed of download speed of up loads. Uh, the other thing to keep in mind when we talk about security around wireless access points is it's very easy for an attacker to put what's called an evil twin out there where which mimics, um,
you know, the organization's network. Right? So, for example, let's say I'm I own a Starbucks, and I've got a corporate employees Starbucks network of Let's just say, corporate Starbucks, right?
The attacker creates a wireless access point with a similar name. So it might be, um,
corporate Starbucks to write or accounting Starbucks or Starbucks guest just anything around the name of the company where the average person might just connected that instead of the correct wireless access point.
And oftentimes the Attackers might boost their signal. So their devices the one that you come across first and you think, Hey, it's a stronger single. It must be the correct device to connect to.
So let's talk about wireless encryption. So first we'll talk about Web now weapons, an older protocol that isn't frequently used. In fact, I don't know any organizations off the top of my head that actually use it anymore. But it stands for Wired equivalent privacy and essentially calculated a 32 bit integrity check value. And this one is pretty easy to break now
Let's say that I'm traveling somewhere overseas and I've got a choice between plugging in to the wall socket with with a network cable. Or I can use the weapon krypton available. You know, I'm gonna have a tough decision there, right? Because I don't really know what's on the other side of that port. If I'm plugging a cable in directly to the wall there
and trans versa, Lee Weapon isn't really that secure. But can I maybe use Web and then use a VPN or something? That's kind of up to me to decide at that point, right? But for the most part, you don't necessarily see weapon use anymore. We have W P A. So this stands for WiFi protected access. We'll also talk about W p. A Tua's well,
but W p. A uses what's called T kip,
so it's a temporal key integrity protocol, which is 128 bit key on then the clients Mac address and that gives us a little stronger encryption than Web. And then WP a to really function is pretty similar to WP a what it does, though it also uses A s and for the encryption. So just a quick question question here.
The frequency for this standard can be to 4 to 5 gigahertz.
Second inmediato to 11 a. C 8 to 11 n or 802 11 d
All right, so if you guessed 802 11 and you are correct again, that's one of the ones I mentioned you want to know for the CH exam? So in this video, we just talked about the 802.11 standard Again. You can take a look at those and kind of be familiar with the different standards under 802 11, But you definitely want to know. 802.11 And for the CH exam.
We also talked about some of the advantages and disadvantages
of using WiFi as well as the different types of wireless encryption. So again, Webb, W, p A, N W P A. To
Ethical Hacking (CEH Preparation)
Master the core techniques and technologies of penetration testing and ethical hacking and assess the ...
Kali Linux Fundamentals
In this Kali Linux course you will learn about the industry standard tool for penetration ...
1 CEU/CPE Hours Available
Certificate of Completion Offered