Video Description

As we conclude the Module on Telecommunications, we must include Wireless and Wi-Fi communications. We discuss how Wireless transmissions occur, how to secure your ID, what an access point is. We learn what the 802.11 family of standards are, how each iteration differs, and why WAPII is significant. We look at security issues such as unauthorized access and rough access point, and we examine in great details the differences between WEP and WPA which is advised a strong exam component. Lastly there is coverage given to our wireless devices such as Bluetooth, with an examination of Bluetooth attacks, WAP, which is Wireless Application Protocol for wireless device and where its vulnerability occurs, and a final wrap up on testable information to focus on from this chapter on Telecommunications.

Course Modules

CISSP Archive (10 Domain - 2014)

CISSP 2015 Domain Restructuring