Wireless Security
4.0 (4 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
112 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Wireless Security to your Wishlist.

Add to Wishlist

Wireless Security

An introductory course about understanding wireless technology, ways of securing it and its future in our everyday life.
4.0 (4 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
112 students enrolled
Last updated 3/2015
English
Price: $50
30-Day Money-Back Guarantee
Includes:
  • 2.5 hours on-demand video
  • 1 min on-demand audio
  • 12 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Be aware of the types of wireless networks.
  • Know the benefits, advantages and pitfalls of wireless networks.
  • Determine if wireless security is truly secure.
  • Be aware of the different types of wireless security.
  • Know the different ways to secure wireless technology.
  • Know the future of both wireless technology and its security.
View Curriculum
Requirements
  • Basic understanding of the business industry
  • Knowledge of the English language
Description

Wireless security, with the use of wireless networks, prevents unwanted access or damage to computers.

This course will discuss a variety of topics including the differences between wireless network and wired network, wireless technical standards and current and future applications of wireless technology.

The course will also examine challenges and types of wireless security, its vulnerabilities and security issues. Lastly the course will discuss securing wireless technology and its future.

Who is the target audience?
  • Recent graduates looking to get a foothold in the IT Industry.
  • Individuals and businesses wanting to reduce security risks and avoid potential financial losses.
  • Businesses looking to prevent wireless security attacks.
  • IT managers wanting to plan a wireless security strategy.
  • IT professionals learning about wireless network and security technologies.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 65 Lectures Collapse All 65 Lectures 06:17:26
+
Introduction to Wireless Network
8 Lectures 29:56

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 2: Introduction to Wireless Network

Lecture 3: Wireless Network vs Wired Network

Lecture 4: Types of Wireless Network

Lecture 5: Benefits of Wireless Network

Lecture 6: Advantages of Wireless Network

Lecture 7: Pitfalls of Wireless Network

Preview 00:30

This lecture will introduce the wireless network.

Preview 01:17

This lecture will identify the differences between the wireless network and the wired network.

.

Lecture outline:

0:00    Wired Network Pros
1:37    Wired Network Cons
2:38    Wireless Network Pros
3:57    Wireless Network Cons
Preview 05:11

This discussion will focus on the different types of wireless networks.

.

Lecture outline:

0:00    Wireless PAN
0:59    Wireless LAN
7:57    Wireless Mesh Network
10:31   Wireless Metropolitan Area Network
13:09   Wireless Wide Area Network
14:12   Cellular Network
Preview 16:17

This lecture will talk about the benefits of the wireless network.

Benefits of Wireless Network
03:19

This lecture will identify advantages of the wireless network.

Advantages of Wireless Network
01:46

This discussion will center on some pitfalls of the wireless network.

Pitfalls of Wireless Network
01:36

Section 1 - Quiz
6 questions

This PDF file contains Section 1 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 1
18 pages
+
Standards, Uses, Health Risks and How Wireless Works
6 Lectures 25:57

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 10: Wireless Technological Standards

Lecture 11: Current and Future Applications

Lecture 12: Health Risks and Wi-Fi

Lecture 13: How Does Wireless Work?

Preview 00:31

This lecture will discuss standards in wireless technology.

.

Lecture outline:

0:00    Introduction to Wireless Standards
0:30    802.11
1:03    802.11b
2:33    802.11a
4:21    802.11g
5:35    802.11n
Wireless Technological Standards
07:40

This discussion will focus on some current and future applications of the wireless network.

.

Lecture outline:

0:00    Introduction to Wireless Network Application
1:26    Applications of Cellular Systems
3:44    WLAN-based Application
6:09    GPS-based Application
7:49    Satellite-based PCS
8:40    Ad-hoc Network
9:57    Sensor Network
Current and Future Applications
10:34

This lecture will explore the possibility of health risks precipitated by Wi-FI technology.

Health Risks in Wi-Fi
04:39

This lecture will talk about how wireless technology works.

How Does Wireless Work?
02:33

Section 2 - Quiz
6 questions

This PDF file contains Section 2 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 2
13 pages
+
Introduction to Wireless Security
8 Lectures 24:56

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 16: Definition of Wireless Network

Lecture 17: Importance of Wireless Network

Lecture 18: Is Wireless Network Truly Secure?

Lecture 19: History of Wireless Network

Lecture 20: Challenges Involved in Wireless Network

Lecture 21: Types of Wireless Network

Preview 00:27

This lecture will explain the definitions of the wireless security.

Definition of Wireless Security
03:12

This lecture will discuss the importance of the wireless security.

Importance of Wireless Security
03:07

This lecture will talk about how truly secure wireless security are.

Is Wireless Security Truly Secure?
02:09

This lecture will discuss the history of the wireless security.

History of Wireless Security
07:16

This discussion will focus on some challenges in the wireless security.

Challenges Involved in Wireless Security
01:56

This lecture will identify the types of wireless security.

.

Lecture outline:

0:00    Introduction to Types of Wireless Security
0:07    Wired Equivalent Privacy
2:32    Wi-Fi Protected Access
3:58    WPA2
4:26    Wi-Fi Protected Setup
5:58    802.1x
Types of Wireless Security
06:49

Section 3 - Quiz
6 questions

This PDF file contains Section 3 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 3
12 pages
+
Wireless Vulnerabilities
7 Lectures 17:42

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 24: Weaknesses in WEP

Lecture 25: Weaknesses in Encryuption Algorithm

Lecture 26: Weaknesses in Key Management

Lecture 27: Weaknesses in User Behavior

Lecture 28: Stealing User Devices

Preview 00:23

This lecture will discuss the weaknesses of WEP or Wired Equivalent Privacy.

Weaknesses in WEP
05:25

This lecture will explain the weaknesses of encryption algorithms.

Weaknesses in Encryption Algorithm
05:12

This discussion will focus on the weaknesses of key management.

Weaknesses in Key Management
02:34

This discussion will center on the weaknesses of user behavior.

Weaknesses in User Behavior
01:47

This lecture will talk about the theft of user devices.

Stealing User Devices
02:21

Section 4 - Quiz
6 questions

This PDF file contains Section 4 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 4
9 pages
+
Security Issues with Wireless
10 Lectures 14:14

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 31: Security Problems in Wireless

Lecture 32: Modes of Wireless Networking

Lecture 33: Ad-hoc Networking

Lecture 34: Infrastructure Networks

Lecture 35: Footprint the Wireless Network

Lecture 36: Passive Attack

Lecture 37: Authentication and Authorization

Lecture 38: Active Attacks and Denial of Service

Preview 00:23

This lecture will discuss some security issues concerning the wireless networking.

Security Problems in Wireless
01:18

This discussion will focus on one of the security issues in wireless networking, namely modes of wireless networking.

Modes of Wireless Networking
00:37

This discussion will focus on one of the security issues in wireless networking, namely ad-hoc networks.

Ad-hoc Networks
01:31

This discussion will focus on one of the security issues in wireless networking, namely infrastructure networks.

Infrastructure Networks
02:29

This discussion will focus on one of the security issues in wireless networking, namely footprints in the wireless network.

Footprint the Wireless Network
02:08

This discussion will focus on one of the security issues in wireless networking, namely passive attacks.

Passive Attack
00:42

This discussion will focus on one of the security issues in wireless networking, namely authentication and authorization.

Authentication and Authorization
02:22

This discussion will focus on one of the security issues in wireless networking, namely active attacks and denial of service.

Active Attacks and Denial of Service
02:44

Section 5 - Quiz
6 questions

This PDF file contains Section 5 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 5
7 pages
+
Securing Wireless Technology
9 Lectures 20:56

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 41: The Mobility Advantage

Lecture 42: Modes of Unauthorized Access

Lecture 43: Securing Wireless Transmissions

Lecture 44: Securing Wireless Access Points

Lecture 45: Stone Wireless Client Devices

Lecture 46: Data Security on Wireless Networks

Lecture 47: Securing Wireless Networks

Preview 00:24

This discussion will discuss one of the technologies involved in securing wireless networks, specifically the mobility advantage.

The Mobility Advantage
00:46

This discussion will explain one of the technologies involved in securing wireless networks, specifically the modes of unauthorized access.

.

Lecture outline:

0:00    Introduction to Modes of Unauthorized Access
0:37    Accidental Association
1:34    Malicious Association
2:36    Ad-hoc Networks
4:37    Non-traditional Networks
5:04    Identity Theft
6:34    Man-in-the-middle Attacks
7:40    Denial of Service
9:02    Network Injection
9:37    Caffe Latte Attack
Modes of Unauthorized Access
10:13

This discussion will explain one of the technologies involved in securing wireless networks, specifically wireless transmissions.

.

Lecture outline:

0:00    Three Basic Threats
0:10    Protecting the Confidentiality
1:53    Preventing the Alteration of
        Intercepted Communications
2:14    Countermeasures to Reduce the Risk
Securing Wireless Transmissions
02:56

This discussion will explain one of the technologies involved in securing wireless networks, specifically wireless access points.

.

Lecture outline:

0:00    Introduction to Securing
        Wireless Access Points
0:21    Eliminating Rogue Access Points
0:43    Properly Configure All Access Points
1:03    Using 802.1x to Authenticate All Devices
Securing Wireless Access Points
01:30

This discussion will explain one of the technologies involved in securing wireless networks, specifically storing wireless client devices.

Store Wireless Client Devices
00:42

This discussion will explain one of the technologies involved in securing wireless networks, specifically data security.

Data Security on Wireless Networks
01:01

This discussion will provide a general view of securing wireless networks.

.

Lecture outline:

0:00    Use of Encryption
0:34    Use Anti-virus and Anti-spyware
	Software and Firewall
0:56    Turn Off Identifier Broadcasting
1:27    Change the Identifier on the Router
2:07    Change Your Router's Pre-set Password
2:28    Allow Specific Computers to
	Access the Wireless Network
2:54    Turn off Wireless Network
3:11    Don't Assume Public Hotspots are Secure
Securing Wireless Networks
03:24

Section 6 - Quiz
6 questions

This PDF file contains Section 6 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 6
11 pages
+
Future of Wireless and Its Security
11 Lectures 23:18

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 50: Introduction to the Future of Wireless

Lecture 51: Broader Broadband

Lecture 52: Tougher Radio Frequency Signals

Lecture 53: The Wi-Fi-Zation of Things

Lecture 54: Improved Security

Lecture 55: Cooperation with Non-Wi-Fi Networks

Lecture 56: Self Managing Wi-Fi Clients

Lecture 57: Improved Mobility via Smarter RF Management

Lecture 58: Personal Area Wi-Fi

Preview 00:31

This lecture will discuss the future of wireless networking.

Introduction to the Future of Wireless
12:02

This discussion will focus on one of possible future applications of wireless networking, namely broader broadband.

Broader Broadband
01:28

This discussion will focus on one of possible future applications of wireless networking, namely tougher radio frequency signals.

Tougher Radio Frequency Signals
00:22

This discussion will focus on one of possible future applications of wireless networking, namely Wi-Fi-zation of things.

The Wi-Fi-Zation of Things
01:10

This discussion will focus on one of possible future applications of wireless networking, namely improved security.

Improved Security
01:27

This discussion will focus on one of possible future applications of wireless networking, namely cooperating with non-Wi-Fi networks.

Cooperation with Non-Wi-Fi Networks
01:10

This discussion will focus on one of possible future applications of wireless networking, namely self-managing Wi-Fi clients.

Self Managing Wi-Fi Clients
02:02

This discussion will focus on one of possible future applications of wireless networking, namely improved mobility.

Improved Mobility via Smarter RF Management
01:48

This discussion will focus on one of possible future applications of wireless networking, namely having personal Wi-Fi areas.

Personal Area Wi-Fi
01:18

Section 7 - Quiz
6 questions

This PDF file contains Section 7 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 7
11 pages
+
Course Resources
3 Lectures 00:00

This e book contains the entire Wireless Security course in a PDF format.

Wireless Security Complete Certification Kit Book
126 pages

This e book is a list of terms and definitions often used in the field of Wireless Security.

Wireless Security Glossary of Terms
3 pages

This PDF file contains all the answers to all the quizzes in each section of this course.

Quiz Answer Sheet
7 pages
+
Wireless Security Certification
3 Lectures 01:27

Now that you've finished your Udemy course, - you are eligible to sit your official Certification exam.

Certification is not mandatory.

Once you've completed the course, email our exam department at exams@artofservice.com.au to purchase your exam voucher and sit your final exam.

. Access includes a step-by-step procedure on how to take the final exam and how to obtain your exam certification.

You will receive a PDF certificate through your email upon passing the examination.

Final Exam
1 page

We are always in the process of improving our courses and procedures for a better learning experience for our students. Your input is very important to us.

Follow the step-by-step procedure on taking the evaluation and receiving your certificate of completion.

Evaluation Form
1 page

A final message from our CEO.

Conclusion - Final Lecture
01:27
About the Instructor
The Art Of Service
3.4 Average rating
386 Reviews
4,770 Students
57 Courses
Quality education for Career Driven IT Professionals

What drives us?

In one word? YOU

You are front, center and behind every decision we make in our business.

  • You are starting out in the IT industry
  • You are serious about your career
  • You need certifications on your resume to get that first interview

For you we created the Foundation level courses as well as the Core Series for IT

  • You are an IT Professional with a proven career
  • You need to stay in touch with changes in the industry
  • You need to continue to show your value to the business to ensure your job is secure
  • You want to find out what else would make your IT career more solid

For you we created the Specialist and Intermediate level courses as well as the Core Series for IT

  • You are implementing Processes and methodologies in your company
  • You are managing a team of people and need to look good
  • You started your own business and are looking for template documents to ‘hit the ground running’
  • You need to present on a subject at the next team meeting and are not quite sure where to start

For you we created the Toolkits as well as the Core Series for IT


Our motto:
Every Career driven IT Professional needs to be able to afford quality IT educational materials to stay relevant in their job, irrespective of current position, budget or geographical location.

We do most of the work behind the scenes so that you can focus on your professional education and your career within the IT industry.

We see it as our job to ensure we give you the most up to date information you need to succeed in achieving that goal at a price-point that is makes it accessible to most professionals.