Cyber Security Awareness: Security by Geolocation
With heavy dependence on wireless technology, it is important to understand that there is a geological presence associated with each signal. This course will help you trust and verify wireless signals along with other secure practices.
Have you ever found yourself connecting to a Wi-Fi hotspot at a coffee shop and wondering how someone could figure out where you are? This course, Cyber Security Awareness: Security by Geolocation will help you understand how a geological presence with each signal. First, you will get a look at the heavy dependence on wireless technology and what it opens a user up to. Then, you will explore how wardriving can be used for a defensive purpose. You will also see triangulation, trilateration, and multilateration methods of geolocation. Finally, you will see some of the products available to perform geolocation. When you're finished with this course, you will better understand how to locate wireless signal sources using geolocation techniques.
Course SyllabusIntroduction- 7m 59s
—Welcome 3m 55s
—Background 4m 4sWardriving- 18m 1s
—Definition 8m 32s
—Statistics 4m 39s
—Access Points 4m 49sGeolocation- 23m 54sAvailable Products- 6m 2sConclusion- 1m 15s