Wireless Hacking and Security

In-depth look at wireless security, demonstrating how IEEE 802.11 wireless attacks are carried out and defended against.
4.8 (2 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
56 students enrolled
$40
Take This Course
  • Lectures 104
  • Length 9 hours
  • Skill Level Expert Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 10/2013 English

Course Description

Veteran instructor Bobby Rogers first provides a foundation in wireless security technologies before he proceeds with practical demonstrations on securing both clients and network devices. He also demonstrates how to monitor wireless networks, capture wireless traffic, and even crack WEP and WPA keys. This title is a self-paced software training course delivered via pre-recorded video. We do not provide additional information outside of the posted content.

What are the requirements?

  • n/a

What am I going to get from this course?

  • Learn to secure both client and network devices from wireless attacks.

What is the target audience?

  • Internet and Network Security

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction
Welcome
Preview
01:43
Course Outline
Preview
05:12
Section 2: Overview of Wireless Networking
Wireless Terminology
Preview
04:15
Wireless Basics
Preview
04:09
Wireless Hardware
Preview
04:27
Wireless Transmission Methods
Preview
03:14
802.11 Standards pt. 1
Preview
04:39
802.11 Standards pt. 2
Preview
04:17
Other Standards
Preview
02:42
Wireless Topologies
Preview
04:47
Section 3: Wireless Security Basics
Wireless vs Wired Networks
Preview
02:50
Wireless Security Issues
Preview
03:37
Encryption
Preview
03:13
Authentication
Preview
05:41
SSID Broadcasting
Preview
04:36
MAC Address Filtering
Preview
05:33
Section 4: Wireless Security Protocols
WEP
05:53
WPA
03:52
WPA2
04:21
802.1x
04:10
EAP
04:52
WAP
05:03
Authentication Methods
05:28
Section 5: Securing Desktop Clients
General Client Security
06:47
Legacy Clients
04:58
Securing Windows 7 and 8
06:31
Securing a Linux Client
06:01
Physical Security
06:45
Security Policies and Enforcement
06:26
Section 6: Wireless Access Points
Securing WAPs pt. 1
04:01
Securing WAPs pt. 2
05:18
Securing WAP Traffic pt. 1
06:52
Securing WAP Traffic pt. 2
06:01
Securing Client Access
04:51
AP Physical Security
05:28
Section 7: Mobile Wireless
Securing Smartphones
07:04
Securing Tablets
03:51
WiMAX
05:41
ZigBee
05:53
RFID
04:13
Section 8: Securing Bluetooth
Overview of Bluetooth
04:27
Bluetooth Weaknesses
03:45
Bluetooth Security Features
05:18
Bluetooth Attacks
03:47
Bluetooth Attack Tools
05:24
Securing Bluetooth
03:49
Section 9: Hacking Basics
Intro to Penetration Testing
05:29
Wardriving and Warchalking
04:41
Methodology
06:15
Goals
06:14
Planning the Test
06:41
Conducting the Test
05:53
Professional Conduct
06:14
Section 10: Wireless Security Tools
Intro to Security Tools
04:54
Hardware
06:19
Pen Testing Platforms
06:16
Backtrack Toolset
05:40
Kismet
04:21
Aircrack-ng
06:25
Gerix
05:57
Wireshark
06:13
Net Stumbler
04:16
Modern Windows Tools
06:24
Other Tools
04:51
Section 11: Wireless Security Testing Section One
Setting Up Hardware
06:54
Verifying Hardware
05:08
Monitor Mode pt. 1
04:18
Monitor Mode pt. 2
03:53
Scanning
05:30
Capturing Traffic pt. 1
05:59
Capturing Traffic pt. 2
04:46
Viewing Traffic Captures pt. 1
05:04
Viewing Traffic Captures pt. 2
06:58
Section 12: Wireless Security Testing Section Two
WEP Attacks
03:15
Aireplay-ng Attacks
06:00
Fake Authentication
04:32
Deauthentication Attacks
05:49
ARP Replay Attacks
05:22
Cracking WEP pt. 1
04:58
Cracking WEP pt. 2
05:46
Section 13: Wireless Security Testing Section Three
WPA Attacks
02:41
Cracking WPA pt. 1
02:30
Cracking WPA pt. 2
03:37
Rogue APs
06:06
Detecting Rogue APs
04:11
Attacking Past Wireless
06:24
Section 14: Legal Issues

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

VTC Software Training, Affordable, Comprehensive Software Training

VTC is one of the world's leading producers of online computer and software training, supplying richly diverse courses of informative and inspiring tutorials. Created on the idea that anyone should have the ability to learn to use computer software on their own time, VTC has produced tens of thousands of hours of extraordinarily valuable, insightful, and easy to follow tutorials and delivers them for a fraction of the cost of other training methods. Our training authors are some of the most accomplished in their respective fields. The tutorials that could make the difference in your new job, promotion, or school advancement are always available and only a click away.

Ready to start learning?
Take This Course