Wireless Hacking and Security
This VTC course delivers an in-depth look at wireless security, demonstrating how IEEE 802.11 wireless attacks are carried out and defended against. Veteran instructor Bobby Rogers first provides a foundation in wireless security technologies before he proceeds with practical demonstrations on securing both clients and network devices. He also demonstrates how to monitor wireless networks, capture wireless traffic, and even crack WEP and WPA keys. To begin learning today, simply click on the movie links.
Introduction
WelcomeCourse Outline
Overview of Wireless Networking
Wireless TerminologyWireless Basics
Wireless Hardware
Wireless Transmission Methods
802.11 Standards pt. 1
802.11 Standards pt. 2
Other Standards
Wireless Topologies
Wireless Security Basics
Wireless vs Wired NetworksWireless Security Issues
Encryption
Authentication
SSID Broadcasting
MAC Address Filtering
Wireless Security Protocols
WEPWPA
WPA2
802.1x
EAP
WAP
Authentication Methods
Securing Desktop Clients
General Client SecurityLegacy Clients
Securing Windows 7 and 8
Securing a Linux Client
Physical Security
Security Policies and Enforcement
Wireless Access Points
Securing WAPs pt. 1Securing WAPs pt. 2
Securing WAP Traffic pt. 1
Securing WAP Traffic pt. 2
Securing Client Access
AP Physical Security
Mobile Wireless
Securing SmartphonesSecuring Tablets
WiMAX
ZigBee
RFID
Securing Bluetooth
Overview of BluetoothBluetooth Weaknesses
Bluetooth Security Features
Bluetooth Attacks
Bluetooth Attack Tools
Securing Bluetooth
Hacking Basics
Intro to Penetration TestingWardriving and Warchalking
Methodology
Goals
Planning the Test
Conducting the Test
Professional Conduct
Wireless Security Tools
Intro to Security ToolsHardware
Pen Testing Platforms
Backtrack Toolset
Kismet
Aircrack-ng
Gerix
Wireshark
Net Stumbler
Modern Windows Tools
Other Tools
Wireless Security Testing Section One
Setting Up HardwareVerifying Hardware
Monitor Mode pt. 1
Monitor Mode pt. 2
Scanning
Capturing Traffic pt. 1
Capturing Traffic pt. 2
Viewing Traffic Captures pt. 1
Viewing Traffic Captures pt. 2
Wireless Security Testing Section Two
WEP AttacksAireplay-ng Attacks
Fake Authentication
Deauthentication Attacks
ARP Replay Attacks
Cracking WEP pt. 1
Cracking WEP pt. 2
Wireless Security Testing Section Three
WPA AttacksCracking WPA pt. 1
Cracking WPA pt. 2
Rogue APs
Detecting Rogue APs
Attacking Past Wireless
Legal Issues
Intro to Legal IssuesLaws and Regulations pt. 1
Laws and Regulations pt. 2
Laws and Regulations pt. 3
Liability
Wireless Security Best Practices
Wireless Security StandardsDesigning the Network
Configuring Wireless Clients
Configuring Access Points
Securing Users
Connecting Different Networks
Corporate Policies
Security Testing
Conclusion
ResourcesWireless Tools
Certifications
Course Wrap Up
No comments:
Post a Comment