Take this
course

Software Development / Security & Encryption

Wireless Types and Vulnerabilities

Learn about wireless types and vulnerabilities. We will discuss different standards, systems, and attacks paired with demonstrations on InSSIDer, Jammer, Fake AP, and Capsa.

Description

Wireless attacks have become so easy even unskilled people with little computer literacy can accomplish them. This is because of the many automated tools available to perform this hack. 


In this Wireless Types and Vulnerabilities course we will not be focusing on weaknesses of your wireless networks or how to protect them; instead, we will focus on how to gain access to a wireless network. 


Topics Covered Include:

  • Wireless Authentication
  • Authentication Systems 

Take Advantage of our extra downloadable supplemental materials. 

**This .zip file includes PDF versions of our Script, PPT Slides, Quiz Questions, and vocabulary tools to better enhance your understanding for Wireless Types and Vulnerabilities.

Full details

Curriculum

  • Wireless Authentication
    Introduction
    0:39
    Wireless Communication Systems
    2:13
    Standards
    4:41
    DEMO: InSSIDer
    5:50
    Encryption Protocols
    8:40
    WPA2 Encryption
    2:54
  • Authentication Systems
    Systems
    7:02
    DEMO: Jammer
    2:26
    DEMO: Fake AP
    2:45
    Attacks
    5:04
    DEMO: Capsa
    5:41
  • Conclusion
    Conclusion
    0:40
    Wireless Types and Vulnerabilities: Supplemental Materials
    Take advantage of all our extra downloadable supplemental materials. This .zip file includes PDF versions of our Script, PPT Slides, Quiz Questions, and vocabulary tools to better enhance your understanding for Wireless Types and Vulnerabilities Chapters 1 & 2.

Skills

  • Information Systems Security
  • IT Security
  • Information Security
  • Certified Ethical Hacker (CEH)
  • CompTIA Security+
  • IT Certification
  • IT Security Certification

Similar Courses

More Courses by this Instructor