Please enable JavaScript to use CodeHS

Tennessee Cybersecurity II: 11

CodeHS Lessons

Analyze attack methods on wireless networks. Read and interpret trade journals, assessing the usefulness of each source, to describe the different methods used. For example, cite evidence from trade journals to explain man in the middle, sniffing, and wireless SSID spoofing to explain their unique attack methods.

3.3 Protocols and Standards
5.1 Network Attacks
5.4 Protocols and Standards
7.9 Protocols and Standards