Wireless Hacking And Security - Video Tutorials

830.00

Wireless Hacking And Security - Video Tutorials - Full Course Detail


Duration : 9 hrs / 104 tutorials


Introduction

Welcome (01:44)

Course Outline (05:12)


Overview of Wireless Networking

Wireless Terminology (04:16)

Wireless Basics (04:09)

Wireless Hardware (04:28)

Wireless Transmission Methods (03:14)

802.11 Standards pt. 1 (04:40)

802.11 Standards pt. 2 (04:17)

Other Standards (02:42)

Wireless Topologies (04:47)


Wireless Security Basics

Wireless vs Wired Networks (02:51)

Wireless Security Issues (03:38)

Encryption (03:14)

Authentication (05:41)

SSID Broadcasting (04:37)

MAC Address Filtering (05:34)


Wireless Security Protocols 

WEP (05:53)

WPA (03:52)

WPA2 (04:21)

802.1x (04:10)

EAP (04:53)

WAP (05:03)

Authentication Methods (05:28)


Securing Desktop Clients 

General Client Security (06:47)

Legacy Clients (04:58)

Securing Windows 7 and 8 (06:31)

Securing a Linux Client (06:02)

Physical Security (06:45)

Security Policies and Enforcement (06:27)


Wireless Access Points 

Securing WAPs pt. 1 (04:01)

Securing WAPs pt. 2 (05:18)Securing WAP Traffic pt. 1 (06:52)

Securing WAP Traffic pt. 2 (06:01)

Securing Client Access (04:52)

AP Physical Security (05:28)


Mobile Wireless 

Securing Smartphones (07:05)

Securing Tablets (03:52)

WiMAX (05:42)

ZigBee (05:53)

RFID (04:13)


Securing Bluetooth 

Overview of Bluetooth (04:27)

Bluetooth Weaknesses (03:45)

Bluetooth Security Features (05:19)

Bluetooth Attacks (03:48)

Bluetooth Attack Tools (05:24)

Securing Bluetooth (03:49)


Hacking Basics 

Intro to Penetration Testing (05:29)

Wardriving and Warchalking (04:41)

Methodology (06:15)

Goals (06:14)

Planning the Test (06:41)

Conducting the Test (05:54)

Professional Conduct (06:15)


Wireless Security Tools 

Intro to Security Tools (04:54)

Hardware (06:19)

Pen Testing Platforms (06:16)

Backtrack Toolset (05:41)

Kismet (04:21)

Aircrack-ng (06:25)

Gerix (05:58)

Wireshark (06:14)

Net Stumbler (04:16)

Modern Windows Tools (06:24)

Other Tools (04:51)


Wireless Security Testing Section One 

Setting Up Hardware (06:54)

Verifying Hardware (05:08)

Monitor Mode pt. 1 (04:19)

Monitor Mode pt. 2 (03:54)

Scanning (05:30)

Capturing Traffic pt. 1 (06:00)

Capturing Traffic pt. 2 (04:46)

Viewing Traffic Captures pt. 1 (05:05)

Viewing Traffic Captures pt. 2 (06:59)


Wireless Security Testing Section Two 

WEP Attacks (03:15)

Aireplay-ng Attacks (06:00)Fake Authentication (04:33)

Deauthentication Attacks (05:50)

ARP Replay Attacks (05:22)

Cracking WEP pt. 1 (04:58)

Cracking WEP pt. 2 (05:46)


Wireless Security Testing Section Three 

WPA Attacks (02:41)

Cracking WPA pt. 1 (02:30)

Cracking WPA pt. 2 (03:38)

Rogue APs (06:06)

Detecting Rogue APs (04:11)

Attacking Past Wireless (06:24)


Legal Issues 

Intro to Legal Issues (03:49)

Laws and Regulations pt. 1 (06:22)

Laws and Regulations pt. 2 (06:19)

Laws and Regulations pt. 3 (06:30)

Liability (06:31)


Wireless Security Best Practices 

Wireless Security Standards (05:27)

Designing the Network (06:10)

Configuring Wireless Clients (05:28)

Configuring Access Points (05:45)

Securing Users (05:05)

Connecting Different Networks (05:53)

Corporate Policies (04:58)Security Testing (05:23)


Conclusion 

Resources (03:26)

Wireless Tools (07:13)

Certifications (03:44)

Course Wrap Up (03:13)

Credits About the Author (01:25)

Reviews