diff --git a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/101-wifi.md b/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/101-wifi.md index c9ca14712..fcf638c38 100644 --- a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/101-wifi.md +++ b/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/101-wifi.md @@ -40,4 +40,5 @@ To protect yourself and your devices, follow these best practices: By understanding the potential security risks associated with WiFi connections and following these best practices, you can enjoy the convenience, flexibility, and mobility of WiFi while ensuring a secure browsing experience. -- [Wireless Networks - Howstuffworks](https://computer.howstuffworks.com/wireless-network.htm) \ No newline at end of file +- [Wireless Networks - Howstuffworks](https://computer.howstuffworks.com/wireless-network.htm) +- [That's How Wi-Fi Works](https://youtu.be/hePLDVbULZc) \ No newline at end of file