Ethical Hacking: Hacking Wireless Networks
Pluralsight
Course Summary
In this course, you'll learn the hacking methods that can be used to gain access to your network and how to best lower that security risk. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking.
-
+
Course Description
Great! You have just finished setting up your wireless network. You did everything you were suppose to, like giving your SSID a unique name and securing your network with a strong password, so that someone can't piggyback off your network. Now that you are "safe and secure," you don't have to worry about hackers right? SLOW DOWN there skippy. While you have taken the "basic" steps required, you still need to be aware of some hacking methods that can be used to gain access to your network, despite your precautions. You also need to be very wary whenever you are accessing the network that is not your own, and let's not forget about other wireless technology; Bluetooth. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking.
-
+
Course Syllabus
Insights into Wireless- 53m 16s
—Insights into Wireless 8m 34s
—New Terms to Learn 11m 19s
—Advantages & Disadvantages 5m 50s
—Types of Wi-Fi Networks 2m 39s
—Wi-Fi Standards 7m 24s
—Wi-Fi Authentication Modes 3m 11s
—Chalking 4m 38s
—Antenna Types 7m 22s
—Summary 2m 17sEncryption in Wireless- 23m 50s
—Encryption in Wireless 1m 47s
—WEP Encryption 3m 52s
—WPA & WPA2 Encryption 7m 40s
—Breaking Encryption 6m 7s
—Defending Against Cracking 2m 23s
—Summary 1m 58sThreats from Wireless- 18m 23sThe Methodology of Hacking Wireless- 45m 20sHacking Bluetooth- 17m 23sCountermeasures- 18m 51s