Skip navigation

Preventing rogues and evil twins

Preventing rogues and evil twins: CISSP Cert Prep: 4 Communication and Network Security (2015)
Preventing rogues and evil twins: CISSP Cert Prep: 4 Communication and Network Security (2015)

Attackers sometimes use fake access points that pose as legitimate network connections in order to gain sensitive information or network access. Learn about the risks posed by rogue access points and evil twin attacks.

Resume Transcript Auto-Scroll
Skill Level Advanced
4h 2m
Duration
242,161
Views
Show More Show Less
Skills covered in this course
Network Administration Security IT CISSP

Continue Assessment

You started this assessment previously and didn't complete it. You can pick up where you left off, or start over.

Start My Free Month

Start your free month on LinkedIn Learning, which now features 100% of Lynda.com courses. Develop in-demand skills with access to thousands of expert-led courses on business, tech and creative topics.

Start My Free Month