MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Wireless Hacking and Security

Course Summary

In-depth look at wireless security, demonstrating how IEEE 802.11 wireless attacks are carried out and defended against.


  • +

    Course Syllabus

    • Introduction
      • Welcome
      • Course Outline
    • Overview of Wireless Networking
      • Wireless Terminology
      • Wireless Basics
      • Wireless Hardware
      • Wireless Transmission Methods
      • 802.11 Standards pt. 1
      • 802.11 Standards pt. 2
      • Other Standards
      • Wireless Topologies
    • Wireless Security Basics
      • Wireless vs Wired Networks
      • Wireless Security Issues
      • Encryption
      • Authentication
      • SSID Broadcasting
      • MAC Address Filtering
    • Wireless Security Protocols
      • WEP
      • WPA
      • WPA2
      • 802.1x
      • EAP
      • WAP
      • Authentication Methods
    • Securing Desktop Clients
      • General Client Security
      • Legacy Clients
      • Securing Windows 7 and 8
      • Securing a Linux Client
      • Physical Security
      • Security Policies and Enforcement
    • Wireless Access Points
      • Securing WAPs pt. 1
      • Securing WAPs pt. 2
      • Securing WAP Traffic pt. 1
      • Securing WAP Traffic pt. 2
      • Securing Client Access
      • AP Physical Security
    • Mobile Wireless
      • Securing Smartphones
      • Securing Tablets
      • WiMAX
      • ZigBee
      • RFID
    • Securing Bluetooth
      • Overview of Bluetooth
      • Bluetooth Weaknesses
      • Bluetooth Security Features
      • Bluetooth Attacks
      • Bluetooth Attack Tools
      • Securing Bluetooth
    • Hacking Basics
      • Intro to Penetration Testing
      • Wardriving and Warchalking
      • Methodology
      • Goals
      • Planning the Test
      • Conducting the Test
      • Professional Conduct
    • Wireless Security Tools
      • Intro to Security Tools
      • Hardware
      • Pen Testing Platforms
      • Backtrack Toolset
      • Kismet
      • Aircrack-ng
      • Gerix
      • Wireshark
      • Net Stumbler
      • Modern Windows Tools
      • Other Tools
    • Wireless Security Testing Section One
      • Setting Up Hardware
      • Verifying Hardware
      • Monitor Mode pt. 1
      • Monitor Mode pt. 2
      • Scanning
      • Capturing Traffic pt. 1
      • Capturing Traffic pt. 2
      • Viewing Traffic Captures pt. 1
      • Viewing Traffic Captures pt. 2
    • Wireless Security Testing Section Two
      • WEP Attacks
      • Aireplay-ng Attacks
      • Fake Authentication
      • Deauthentication Attacks
      • ARP Replay Attacks
      • Cracking WEP pt. 1
      • Cracking WEP pt. 2
    • Wireless Security Testing Section Three
      • WPA Attacks
      • Cracking WPA pt. 1
      • Cracking WPA pt. 2
      • Rogue APs
      • Detecting Rogue APs
      • Attacking Past Wireless
    • Legal Issues
      • Intro to Legal Issues
      • Laws and Regulations pt. 1
      • Laws and Regulations pt. 2
      • Laws and Regulations pt. 3
      • Liability
    • Wireless Security Best Practices
      • Wireless Security Standards
      • Designing the Network
      • Configuring Wireless Clients
      • Configuring Access Points
      • Securing Users
      • Connecting Different Networks
      • Corporate Policies
      • Security Testing
    • Conclusion
      • Resources
      • Wireless Tools
      • Certifications
      • Course Wrap Up
    • Credits
      • About the Author


Course Fee:
USD 89

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top