Start learning cybersecurity with CBT Nuggets. https://courses.cbt.gg/security

In this video, Keith Barker covers containing rogue access points in a wireless network. If you're running a network, the last thing you need is one of your users finding their way to a malicious network that's spoofing your SSID. Find them and stop them with WLCs.

Large corporate infrastructures or places like airports are common targets for malicious actors to set up a network that looks and feels a lot like your own. They're on the hunt for your users. If they can spoof your network and SSID successfully, they can get one of your users to use their system and compromise them. Then they might turn that device around and use it for a man-in-the-middle attack on your own network and eavesdrop all the traffic that passes through the device.

But wireless LAN controllers are always listening to their downstream access points, who are - in turn - scanning other channels and reporting back to their WLCs what other access points are broadcasting in nearby ranges. The WLC registers those rogue access points, and if you know how to find that registry, you can act to contain the threats.

Download the Free Ultimate Networking Cert Guide: https://blog.cbt.gg/6piv

⬇️ 13-Week Study Plan: CCNA (200-301): https://blog.cbt.gg/z3r5


Start learning with CBT Nuggets:

• Linux Troubleshooting | https://courses.cbt.gg/2nh
• Linux Essentials | https://courses.cbt.gg/45b
• Linux Security | https://courses.cbt.gg/vu0
• CompTIA Linux+ (XK0-004) | https://courses.cbt.gg/93y
• Linux Server Administration | https://courses.cbt.gg/ekv