Wireless Security
4.6 (14 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
173 students enrolled

Wireless Security

An introductory course about understanding wireless technology, ways of securing it and its future in our everyday life.
4.6 (14 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
173 students enrolled
Last updated 3/2015
English
English [Auto-generated]
Current price: $31.99 Original price: $49.99 Discount: 36% off
4 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 2.5 hours on-demand video
  • 1 min on-demand audio
  • 3 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Be aware of the types of wireless networks.
  • Know the benefits, advantages and pitfalls of wireless networks.
  • Determine if wireless security is truly secure.
  • Be aware of the different types of wireless security.
  • Know the different ways to secure wireless technology.
  • Know the future of both wireless technology and its security.
Requirements
  • Basic understanding of the business industry
  • Knowledge of the English language
Description

Wireless security, with the use of wireless networks, prevents unwanted access or damage to computers.

This course will discuss a variety of topics including the differences between wireless network and wired network, wireless technical standards and current and future applications of wireless technology.

The course will also examine challenges and types of wireless security, its vulnerabilities and security issues. Lastly the course will discuss securing wireless technology and its future.

Who this course is for:
  • Recent graduates looking to get a foothold in the IT Industry.
  • Individuals and businesses wanting to reduce security risks and avoid potential financial losses.
  • Businesses looking to prevent wireless security attacks.
  • IT managers wanting to plan a wireless security strategy.
  • IT professionals learning about wireless network and security technologies.
Course content
Expand all 56 lectures 02:43:26
+ Introduction to Wireless Network
7 lectures 29:56

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 2: Introduction to Wireless Network

Lecture 3: Wireless Network vs Wired Network

Lecture 4: Types of Wireless Network

Lecture 5: Benefits of Wireless Network

Lecture 6: Advantages of Wireless Network

Lecture 7: Pitfalls of Wireless Network

Preview 00:30

This lecture will introduce the wireless network.

Preview 01:17

This lecture will identify the differences between the wireless network and the wired network.

.

Lecture outline:

0:00    Wired Network Pros
1:37    Wired Network Cons
2:38    Wireless Network Pros
3:57    Wireless Network Cons
Preview 05:11

This discussion will focus on the different types of wireless networks.

.

Lecture outline:

0:00    Wireless PAN
0:59    Wireless LAN
7:57    Wireless Mesh Network
10:31   Wireless Metropolitan Area Network
13:09   Wireless Wide Area Network
14:12   Cellular Network
Preview 16:17

This lecture will talk about the benefits of the wireless network.

Benefits of Wireless Network
03:19

This lecture will identify advantages of the wireless network.

Advantages of Wireless Network
01:46

This discussion will center on some pitfalls of the wireless network.

Pitfalls of Wireless Network
01:36
+ Standards, Uses, Health Risks and How Wireless Works
5 lectures 25:57

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 10: Wireless Technological Standards

Lecture 11: Current and Future Applications

Lecture 12: Health Risks and Wi-Fi

Lecture 13: How Does Wireless Work?

Preview 00:31

This lecture will discuss standards in wireless technology.

.

Lecture outline:

0:00    Introduction to Wireless Standards
0:30    802.11
1:03    802.11b
2:33    802.11a
4:21    802.11g
5:35    802.11n
Wireless Technological Standards
07:40

This discussion will focus on some current and future applications of the wireless network.

.

Lecture outline:

0:00    Introduction to Wireless Network Application
1:26    Applications of Cellular Systems
3:44    WLAN-based Application
6:09    GPS-based Application
7:49    Satellite-based PCS
8:40    Ad-hoc Network
9:57    Sensor Network
Current and Future Applications
10:34

This lecture will explore the possibility of health risks precipitated by Wi-FI technology.

Health Risks in Wi-Fi
04:39

This lecture will talk about how wireless technology works.

How Does Wireless Work?
02:33
+ Introduction to Wireless Security
7 lectures 24:56

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 16: Definition of Wireless Network

Lecture 17: Importance of Wireless Network

Lecture 18: Is Wireless Network Truly Secure?

Lecture 19: History of Wireless Network

Lecture 20: Challenges Involved in Wireless Network

Lecture 21: Types of Wireless Network

Preview 00:27

This lecture will explain the definitions of the wireless security.

Definition of Wireless Security
03:12

This lecture will discuss the importance of the wireless security.

Importance of Wireless Security
03:07

This lecture will talk about how truly secure wireless security are.

Is Wireless Security Truly Secure?
02:09

This lecture will discuss the history of the wireless security.

History of Wireless Security
07:16

This discussion will focus on some challenges in the wireless security.

Challenges Involved in Wireless Security
01:56

This lecture will identify the types of wireless security.

.

Lecture outline:

0:00    Introduction to Types of Wireless Security
0:07    Wired Equivalent Privacy
2:32    Wi-Fi Protected Access
3:58    WPA2
4:26    Wi-Fi Protected Setup
5:58    802.1x
Types of Wireless Security
06:49
+ Wireless Vulnerabilities
6 lectures 17:42

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 24: Weaknesses in WEP

Lecture 25: Weaknesses in Encryuption Algorithm

Lecture 26: Weaknesses in Key Management

Lecture 27: Weaknesses in User Behavior

Lecture 28: Stealing User Devices

Preview 00:23

This lecture will discuss the weaknesses of WEP or Wired Equivalent Privacy.

Weaknesses in WEP
05:25

This lecture will explain the weaknesses of encryption algorithms.

Weaknesses in Encryption Algorithm
05:12

This discussion will focus on the weaknesses of key management.

Weaknesses in Key Management
02:34

This discussion will center on the weaknesses of user behavior.

Weaknesses in User Behavior
01:47

This lecture will talk about the theft of user devices.

Stealing User Devices
02:21
+ Security Issues with Wireless
9 lectures 14:14

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 31: Security Problems in Wireless

Lecture 32: Modes of Wireless Networking

Lecture 33: Ad-hoc Networking

Lecture 34: Infrastructure Networks

Lecture 35: Footprint the Wireless Network

Lecture 36: Passive Attack

Lecture 37: Authentication and Authorization

Lecture 38: Active Attacks and Denial of Service

Preview 00:23

This lecture will discuss some security issues concerning the wireless networking.

Security Problems in Wireless
01:18

This discussion will focus on one of the security issues in wireless networking, namely modes of wireless networking.

Modes of Wireless Networking
00:37

This discussion will focus on one of the security issues in wireless networking, namely ad-hoc networks.

Ad-hoc Networks
01:31

This discussion will focus on one of the security issues in wireless networking, namely infrastructure networks.

Infrastructure Networks
02:29

This discussion will focus on one of the security issues in wireless networking, namely footprints in the wireless network.

Footprint the Wireless Network
02:08

This discussion will focus on one of the security issues in wireless networking, namely passive attacks.

Passive Attack
00:42

This discussion will focus on one of the security issues in wireless networking, namely authentication and authorization.

Authentication and Authorization
02:22

This discussion will focus on one of the security issues in wireless networking, namely active attacks and denial of service.

Active Attacks and Denial of Service
02:44
+ Securing Wireless Technology
8 lectures 20:56

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 41: The Mobility Advantage

Lecture 42: Modes of Unauthorized Access

Lecture 43: Securing Wireless Transmissions

Lecture 44: Securing Wireless Access Points

Lecture 45: Stone Wireless Client Devices

Lecture 46: Data Security on Wireless Networks

Lecture 47: Securing Wireless Networks

Preview 00:24

This discussion will discuss one of the technologies involved in securing wireless networks, specifically the mobility advantage.

The Mobility Advantage
00:46

This discussion will explain one of the technologies involved in securing wireless networks, specifically the modes of unauthorized access.

.

Lecture outline:

0:00    Introduction to Modes of Unauthorized Access
0:37    Accidental Association
1:34    Malicious Association
2:36    Ad-hoc Networks
4:37    Non-traditional Networks
5:04    Identity Theft
6:34    Man-in-the-middle Attacks
7:40    Denial of Service
9:02    Network Injection
9:37    Caffe Latte Attack
Modes of Unauthorized Access
10:13

This discussion will explain one of the technologies involved in securing wireless networks, specifically wireless transmissions.

.

Lecture outline:

0:00    Three Basic Threats
0:10    Protecting the Confidentiality
1:53    Preventing the Alteration of
        Intercepted Communications
2:14    Countermeasures to Reduce the Risk
Securing Wireless Transmissions
02:56

This discussion will explain one of the technologies involved in securing wireless networks, specifically wireless access points.

.

Lecture outline:

0:00    Introduction to Securing
        Wireless Access Points
0:21    Eliminating Rogue Access Points
0:43    Properly Configure All Access Points
1:03    Using 802.1x to Authenticate All Devices
Securing Wireless Access Points
01:30

This discussion will explain one of the technologies involved in securing wireless networks, specifically storing wireless client devices.

Store Wireless Client Devices
00:42

This discussion will explain one of the technologies involved in securing wireless networks, specifically data security.

Data Security on Wireless Networks
01:01

This discussion will provide a general view of securing wireless networks.

.

Lecture outline:

0:00    Use of Encryption
0:34    Use Anti-virus and Anti-spyware
	Software and Firewall
0:56    Turn Off Identifier Broadcasting
1:27    Change the Identifier on the Router
2:07    Change Your Router's Pre-set Password
2:28    Allow Specific Computers to
	Access the Wireless Network
2:54    Turn off Wireless Network
3:11    Don't Assume Public Hotspots are Secure
Securing Wireless Networks
03:24
+ Future of Wireless and Its Security
10 lectures 23:18

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 50: Introduction to the Future of Wireless

Lecture 51: Broader Broadband

Lecture 52: Tougher Radio Frequency Signals

Lecture 53: The Wi-Fi-Zation of Things

Lecture 54: Improved Security

Lecture 55: Cooperation with Non-Wi-Fi Networks

Lecture 56: Self Managing Wi-Fi Clients

Lecture 57: Improved Mobility via Smarter RF Management

Lecture 58: Personal Area Wi-Fi

Preview 00:31

This lecture will discuss the future of wireless networking.

Introduction to the Future of Wireless
12:02

This discussion will focus on one of possible future applications of wireless networking, namely broader broadband.

Broader Broadband
01:28

This discussion will focus on one of possible future applications of wireless networking, namely tougher radio frequency signals.

Tougher Radio Frequency Signals
00:22

This discussion will focus on one of possible future applications of wireless networking, namely Wi-Fi-zation of things.

The Wi-Fi-Zation of Things
01:10

This discussion will focus on one of possible future applications of wireless networking, namely improved security.

Improved Security
01:27

This discussion will focus on one of possible future applications of wireless networking, namely cooperating with non-Wi-Fi networks.

Cooperation with Non-Wi-Fi Networks
01:10

This discussion will focus on one of possible future applications of wireless networking, namely self-managing Wi-Fi clients.

Self Managing Wi-Fi Clients
02:02

This discussion will focus on one of possible future applications of wireless networking, namely improved mobility.

Improved Mobility via Smarter RF Management
01:48

This discussion will focus on one of possible future applications of wireless networking, namely having personal Wi-Fi areas.

Personal Area Wi-Fi
01:18
+ Course Resources
1 lecture 00:00

This e book is a list of terms and definitions often used in the field of Wireless Security.

Wireless Security Glossary of Terms
3 pages
+ Wireless Security Certification
3 lectures 01:27

Now that you've finished your Udemy course, - you are eligible to sit your official Certification exam.

Certification is not mandatory.

Once you've completed the course, email our exam department at exams@artofservice.com.au to purchase your exam voucher and sit your final exam.

. Access includes a step-by-step procedure on how to take the final exam and how to obtain your exam certification.

You will receive a PDF certificate through your email upon passing the examination.

Final Exam
1 page

We are always in the process of improving our courses and procedures for a better learning experience for our students. Your input is very important to us.

Follow the step-by-step procedure on taking the evaluation and receiving your certificate of completion.

Evaluation Form
1 page

A final message from our CEO.

Conclusion - Final Lecture
01:27