Learning Outcomes:
Upon successful completion of this module students should be able to:
- Describe the technologies used in creating and using a wireless network
- Explain the operation of various wireless security protocols
- Compare and contrast the relative strengths of said security protocols
- Gather information on wireless networks using both passive and active means
- Explain the technology on which Voice over IP is reliant
- Describe the potential sources of evidence available in VoIP clients and
interceptions.
- Analyse artifacts associated with common VoIP clients.