Hack-Proof Your Wi-Fi: How to Design a Strong Wireless Network with Authentication & Encryption  @cbtnuggets
Hack-Proof Your Wi-Fi: How to Design a Strong Wireless Network with Authentication & Encryption  @cbtnuggets
CBT Nuggets | Hack-Proof Your Wi-Fi: How to Design a Strong Wireless Network with Authentication & Encryption @cbtnuggets | Uploaded 1 year ago | Updated June 07 2023
Are you curious about how enterprise-level wireless networks differ from the Wi-Fi networks we have at home?

In this video, CBT Nuggets trainer Jeff Kish examines the distinctive security requirements of enterprise-level wireless networks and how authentication plays a critical role in securing these networks.

There are two primary authentication methods: using usernames and passwords, and providing certificates. While usernames and passwords are commonly used for authentication, they are not the most secure due to the prevalence of password breaches and weak passwords. Certificates, on the other hand, are more secure because they are digitally signed by an encryption key and unique to each device or user.

Once users are authenticated against a wireless network, we can use that authentication to dictate what they are allowed or not allowed to access. For example, only specific employees may be granted access to the file server, while guests cannot access any internal resources.

However, authentication alone does not ensure data privacy. Anyone can listen to wireless signals, so data needs to be encrypted. The video explores the three primary protocols for encrypting WiFi traffic, with a particular emphasis on the upcoming WPA3 standard that will soon replace WPA2 as the most common encryption protocol.


👉 Watch this entire Certified Wireless Design Professional (CWDP-304) course with Keith Barker and Jeff Kish: https://training.cbt.gg/2j5

👉 Not a CBT Nuggets subscriber? Start your free week: https://www.cbtnuggets.com/signup

👉 Check out Jeff Kish and Keith Barker's other courses:
https://www.cbtnuggets.com/trainers/jeff-kish
https://www.cbtnuggets.com/trainers/keith-barker
-----------------
Connect with CBT Nuggets for the latest in IT training:
• Twitter - https://twitter.com/CBTNuggets
• Facebook - http://facebook.com/CBTNuggets
• Instagram - http://instagram.com/CBTNuggets
• LinkedIn - https://www.linkedin.com/company/cbt-nuggets

#wlan #wirelessnetworks #encryption #ittraining #itcertifications #cbtnuggets
Hack-Proof Your Wi-Fi: How to Design a Strong Wireless Network with Authentication & Encryption @cbtnuggetsClasses and Objects in Python Explained @cbtnuggetsHub vs Router #shorts @cbtnuggetsWhat is Power over Ethernet? @cbtnuggetsHow does DHCP work in an Enterprise? @cbtnuggetsSwitch vs Router #shorts @cbtnuggetsHow to use Moment.js in React | Moment Library in React | Introduction to Moment 🕘 @cbtnuggetsMicrosoft Azure Administrator Associate AZ-104 Quiz #shorts @cbtnuggetsWhat are the Principles of Zero Trust Security? @cbtnuggetsWhat are Dial Peer Wildcards? | Cisco Cube Configuration @cbtnuggetsPrimary Functions of a Router and Switch #shorts @cbtnuggetsHow to Build a React Reusable Calendar Component @cbtnuggetsWhat are the Different Types of Servers? | Server Form Factors @cbtnuggets10 Most Used Linux Commands & download FREE Linux Command Cheat Sheet #shorts @cbtnuggetsNew IT Training Courses | CBT Nuggets @cbtnuggetsHow to Identify Digital Evidence | Introduction to Digital Forensics @cbtnuggetsWhy use Functions in Python? @cbtnuggetsWill there be a new CCNA in 2023? @cbtnuggetsWhat are the Basics of APIs? @cbtnuggetsHow to Create Pages and Set Up Routes in a React App @cbtnuggetsOSI Reference Model & TCP/IP Protocol Stack #shorts @cbtnuggetsWhat is Azure Cosmos DB? @cbtnuggetsWhat is Cisco Unified Communications Manager Express? @cbtnuggets4 Most Difficult Security Certs #shorts @cbtnuggetsHow to Create PostgreSQL Tables with pgAdmin for Beginners in (about) 1 hour @cbtnuggetsHow to Secure Kubernetes GUIs @cbtnuggetsHow to Connect Firebase Auth to an Angular App @cbtnuggetsNew IT Training Courses at CBT Nuggets @cbtnuggetsWhat is Business Continuity and Disaster Recovery Planning? @cbtnuggetsNetwork Commands You Should Know #shorts @cbtnuggetsWhat is H.323 and H.323 Protocol @cbtnuggetsWhy use Recoil in React? | Atoms and Selectors @cbtnuggetsTCP/IP Well Known Ports | CCNA @cbtnuggetsWhat are Azure Availability Zones? @cbtnuggets3 Rules of Cabling @cbtnuggetsWhy Storybook React Makes Building UI Components Easy @cbtnuggetsDifference between a Layer 3 Switch and Router? - Part 2 @cbtnuggetsDifference between a Layer 3 Switch and Router? - Part 1 @cbtnuggetsNew IT Training Courses at CBT Nuggets @cbtnuggetsHow to Check Which Services are Running on a Network using Port Discovery @cbtnuggetsCisco CCNP Exam Updates in 2023 @cbtnuggets6 weeks to study for the CCNA! @cbtnuggetsWhat are the Basics of Jest Syntax? | Testing React Components with Jest | React Testing Library @cbtnuggetsSwitch vs Hub #shorts @cbtnuggetsHow to Effectively Test Your CUCM Dial Plan | Cisco Unified Communications Manager (CUCM) @cbtnuggetsNew IT Training Courses at CBT Nuggets @cbtnuggetsHow to Create Minecraft in Python and Panda3D @cbtnuggetsIntroduction to Cisco Collaboration Technologies and Solutions | Cisco CCT Collaboration @cbtnuggetsWhat is Redux? Why use Redux? @cbtnuggetsHacker Tools, Techniques, and Incident Handling SEC504 #shorts @cbtnuggets

Hack-Proof Your Wi-Fi: How to Design a Strong Wireless Network with Authentication & Encryption @cbtnuggets