Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Wireless Overview - Protocols & Threat Models

Black Hat via YouTube

Overview

Explore the landscape of wireless protocols and associated threat models in this comprehensive Black Hat USA 2002 conference talk. Delve into the intricacies of various wireless technologies, understanding their underlying mechanisms and potential vulnerabilities. Gain valuable insights into the security challenges posed by wireless communications and learn about the different attack vectors that malicious actors may exploit. Analyze real-world scenarios and case studies to better comprehend the risks and mitigation strategies in wireless environments. Equip yourself with the knowledge to assess and enhance the security posture of wireless networks, making informed decisions to protect against potential threats in an increasingly connected world.

Syllabus

Black Hat USA 2002 - Wireless Overview: Protocols & Threat Models

Taught by

Black Hat

Reviews

Start your review of Wireless Overview - Protocols & Threat Models

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.