Pages

Monday, 28 September 2015


Wireless Hacking and Security


This VTC course delivers an in-depth look at wireless security, demonstrating how IEEE 802.11 wireless attacks are carried out and defended against. Veteran instructor Bobby Rogers first provides a foundation in wireless security technologies before he proceeds with practical demonstrations on securing both clients and network devices. He also demonstrates how to monitor wireless networks, capture wireless traffic, and even crack WEP and WPA keys. To begin learning today, simply click on the movie links.

Introduction

Welcome
Course Outline

Overview of Wireless Networking

Wireless Terminology
Wireless Basics
Wireless Hardware
Wireless Transmission Methods
802.11 Standards pt. 1
802.11 Standards pt. 2
Other Standards
Wireless Topologies

Wireless Security Basics

Wireless vs Wired Networks
Wireless Security Issues
Encryption
Authentication
SSID Broadcasting
MAC Address Filtering

Wireless Security Protocols

WEP
WPA
WPA2
802.1x
EAP
WAP
Authentication Methods

Securing Desktop Clients

General Client Security
Legacy Clients
Securing Windows 7 and 8
Securing a Linux Client
Physical Security
Security Policies and Enforcement

Wireless Access Points

Securing WAPs pt. 1
Securing WAPs pt. 2
Securing WAP Traffic pt. 1
Securing WAP Traffic pt. 2
Securing Client Access
AP Physical Security

Mobile Wireless

Securing Smartphones
Securing Tablets
WiMAX
ZigBee
RFID

Securing Bluetooth

Overview of Bluetooth
Bluetooth Weaknesses
Bluetooth Security Features
Bluetooth Attacks
Bluetooth Attack Tools
Securing Bluetooth

Hacking Basics

Intro to Penetration Testing
Wardriving and Warchalking
Methodology
Goals
Planning the Test
Conducting the Test
Professional Conduct

Wireless Security Tools

Intro to Security Tools
Hardware
Pen Testing Platforms
Backtrack Toolset
Kismet
Aircrack-ng
Gerix
Wireshark
Net Stumbler
Modern Windows Tools
Other Tools

Wireless Security Testing Section One

Setting Up Hardware
Verifying Hardware
Monitor Mode pt. 1
Monitor Mode pt. 2
Scanning
Capturing Traffic pt. 1
Capturing Traffic pt. 2
Viewing Traffic Captures pt. 1
Viewing Traffic Captures pt. 2

Wireless Security Testing Section Two

WEP Attacks
Aireplay-ng Attacks
Fake Authentication
Deauthentication Attacks
ARP Replay Attacks
Cracking WEP pt. 1
Cracking WEP pt. 2

Wireless Security Testing Section Three

WPA Attacks
Cracking WPA pt. 1
Cracking WPA pt. 2
Rogue APs
Detecting Rogue APs
Attacking Past Wireless

Legal Issues

Intro to Legal Issues
Laws and Regulations pt. 1
Laws and Regulations pt. 2
Laws and Regulations pt. 3
Liability

Wireless Security Best Practices

Wireless Security Standards
Designing the Network
Configuring Wireless Clients
Configuring Access Points
Securing Users
Connecting Different Networks
Corporate Policies
Security Testing

Conclusion

Resources
Wireless Tools
Certifications
Course Wrap Up

Credits

About the Author

No comments:

Post a Comment