Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
As we conclude the Module on Telecommunications, we must include Wireless and Wi-Fi communications. We discuss how Wireless transmissions occur, how to secure your ID, what an access point is. We learn what the 802.11 family of standards are, how each iteration differs, and why WAPII is significant. We look at security issues such as unauthorized access and rough access point, and we examine in great details the differences between WEP and WPA which is advised a strong exam component. Lastly there is coverage given to our wireless devices such as Bluetooth, with an examination of Bluetooth attacks, WAP, which is Wireless Application Protocol for wireless device and where its vulnerability occurs, and a final wrap up on testable information to focus on from this chapter on Telecommunications.