Setup Menus in Admin Panel

  • LOGIN
  • No products in the cart.

Course Name: Wireless Hacking and Security Course

Descriptions

Course Curriculum

Section 1: Introduction
Welcome 00:00:00
Course Outline 00:00:00
Section 2: Overview of Wireless Networking
Wireless Terminology 00:00:00
Wireless Basics 00:00:00
Wireless Hardware 00:00:00
Wireless Transmission Methods 00:00:00
802.11 Standards pt. 1 00:00:00
802.11 Standards pt. 2 00:00:00
Other Standards 00:00:00
Wireless Topologies 00:00:00
Section 3: Wireless Security Basics
Wireless vs Wired Networks 00:00:00
Wireless Security Issues 00:00:00
Encryption 00:00:00
Authentication 00:00:00
SSID Broadcasting 00:00:00
MAC Address Filtering 00:00:00
Section 4: Wireless Security Protocols
WEP 00:00:00
WPA 00:00:00
WPA2 00:00:00
802.1x 00:00:00
EAP 00:00:00
WAP 00:00:00
Authentication Methods 00:00:00
Section 5: Securing Desktop Clients
General Client Security 00:00:00
Legacy Clients 00:00:00
Securing Windows 7 and 8 00:00:00
Securing a Linux Client 00:00:00
Physical Security 00:00:00
Security Policies and Enforcement 00:00:00
Section 6: Wireless Access Points
Securing WAPs pt. 1 00:00:00
Securing WAPs pt. 2 00:00:00
Securing WAP Traffic pt. 1 00:00:00
Securing WAP Traffic pt. 2 00:00:00
Securing Client Access 00:00:00
AP Physical Security 00:00:00
Section 7: Mobile Wireless
Securing Smartphones 00:00:00
Securing Tablets 00:00:00
WiMAX 00:00:00
ZigBee 00:00:00
RFID 00:00:00
Section 8: Securing Bluetooth
Overview of Bluetooth 00:00:00
Bluetooth Weaknesses 00:00:00
Bluetooth Security Features 00:00:00
Bluetooth Attacks 00:00:00
Bluetooth Attack Tools 00:00:00
Securing Bluetooth 00:00:00
Section 9: Hacking Basics
Intro to Penetration Testing 00:00:00
Wardriving and Warchalking 00:00:00
Methodology 00:00:00
Goals 00:00:00
Planning the Test 00:00:00
Conducting the Test 00:00:00
Professional Conduct 00:00:00
Section 10: Wireless Security Tools
Intro to Security Tools 00:00:00
Hardware 00:00:00
Pen Testing Platforms 00:00:00
Backtrack Toolset 00:00:00
Kismet 00:00:00
Aircrack-ng 00:00:00
Gerix 00:00:00
Wireshark 00:00:00
Net Stumbler 00:00:00
Modern Windows Tools 00:00:00
Other Tools 00:00:00
Section 11: Wireless Security Testing Section One
Setting Up Hardware 00:00:00
Verifying Hardware 00:00:00
Monitor Mode pt. 1 00:00:00
Monitor Mode pt. 2 00:00:00
Scanning 00:00:00
Capturing Traffic pt. 1 00:00:00
Capturing Traffic pt. 2 00:00:00
Viewing Traffic Captures pt. 1 00:00:00
Viewing Traffic Captures pt. 2 00:00:00
Section 12: Wireless Security Testing Section Two
WEP Attacks 00:00:00
Aireplay-ng Attacks 00:00:00
Fake Authentication 00:00:00
Deauthentication Attacks 00:00:00
ARP Replay Attacks 00:00:00
Cracking WEP pt. 1 00:00:00
Cracking WEP pt. 2 00:00:00
Section 13: Wireless Security Testing Section Three
WPA Attacks 00:00:00
Cracking WPA pt. 1 00:00:00
Cracking WPA pt. 2 00:00:00
Rogue APs 00:00:00
Detecting Rogue APs 00:00:00
Attacking Past Wireless 00:00:00
Section 14: Legal Issues
Intro to Legal Issues 00:00:00
Laws and Regulations pt. 1 00:00:00
Laws and Regulations pt. 2 00:00:00
Laws and Regulations pt. 3 00:00:00
Liability 00:00:00
Section 15: Wireless Security Best Practices
Wireless Security Standards 00:00:00
Designing the Network 00:00:00
Configuring Wireless Clients 00:00:00
Configuring Access Points 00:00:00
Securing Users 00:00:00
Connecting Different Networks 00:00:00
Corporate Policies 00:00:00
Security Testing 00:00:00
Section 16: Conclusion
Resources 00:00:00
Wireless Tools 00:00:00
Certifications 00:00:00
Course Wrap Up 00:00:00
Online Learning Thailand.
X