Wireless Security

An introductory course about understanding wireless technology, ways of securing it and its future in our everyday life.
4.0 (4 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
105 students enrolled
$19
$50
62% off
Take This Course
  • Lectures 65
  • Length 6.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 2/2014 English

Course Description

Wireless security, with the use of wireless networks, prevents unwanted access or damage to computers.

This course will discuss a variety of topics including the differences between wireless network and wired network, wireless technical standards and current and future applications of wireless technology.

The course will also examine challenges and types of wireless security, its vulnerabilities and security issues. Lastly the course will discuss securing wireless technology and its future.

What are the requirements?

  • Basic understanding of the business industry
  • Knowledge of the English language

What am I going to get from this course?

  • Be aware of the types of wireless networks.
  • Know the benefits, advantages and pitfalls of wireless networks.
  • Determine if wireless security is truly secure.
  • Be aware of the different types of wireless security.
  • Know the different ways to secure wireless technology.
  • Know the future of both wireless technology and its security.

What is the target audience?

  • Recent graduates looking to get a foothold in the IT Industry.
  • Individuals and businesses wanting to reduce security risks and avoid potential financial losses.
  • Businesses looking to prevent wireless security attacks.
  • IT managers wanting to plan a wireless security strategy.
  • IT professionals learning about wireless network and security technologies.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction to Wireless Network
00:30

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 2: Introduction to Wireless Network

Lecture 3: Wireless Network vs Wired Network

Lecture 4: Types of Wireless Network

Lecture 5: Benefits of Wireless Network

Lecture 6: Advantages of Wireless Network

Lecture 7: Pitfalls of Wireless Network

01:17

This lecture will introduce the wireless network.

05:11

This lecture will identify the differences between the wireless network and the wired network.

.

Lecture outline:

0:00    Wired Network Pros
1:37    Wired Network Cons
2:38    Wireless Network Pros
3:57    Wireless Network Cons
16:17

This discussion will focus on the different types of wireless networks.

.

Lecture outline:

0:00    Wireless PAN
0:59    Wireless LAN
7:57    Wireless Mesh Network
10:31   Wireless Metropolitan Area Network
13:09   Wireless Wide Area Network
14:12   Cellular Network
03:19

This lecture will talk about the benefits of the wireless network.

01:46

This lecture will identify advantages of the wireless network.

01:36

This discussion will center on some pitfalls of the wireless network.

Section 1 - Quiz
6 questions
18 pages

This PDF file contains Section 1 of this course. You can download the complete e book at the end of this course.

Section 2: Standards, Uses, Health Risks and How Wireless Works
00:31

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 10: Wireless Technological Standards

Lecture 11: Current and Future Applications

Lecture 12: Health Risks and Wi-Fi

Lecture 13: How Does Wireless Work?

07:40

This lecture will discuss standards in wireless technology.

.

Lecture outline:

0:00    Introduction to Wireless Standards
0:30    802.11
1:03    802.11b
2:33    802.11a
4:21    802.11g
5:35    802.11n
10:34

This discussion will focus on some current and future applications of the wireless network.

.

Lecture outline:

0:00    Introduction to Wireless Network Application
1:26    Applications of Cellular Systems
3:44    WLAN-based Application
6:09    GPS-based Application
7:49    Satellite-based PCS
8:40    Ad-hoc Network
9:57    Sensor Network
04:39

This lecture will explore the possibility of health risks precipitated by Wi-FI technology.

02:33

This lecture will talk about how wireless technology works.

Section 2 - Quiz
6 questions
13 pages

This PDF file contains Section 2 of this course. You can download the complete e book at the end of this course.

Section 3: Introduction to Wireless Security
00:27

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 16: Definition of Wireless Network

Lecture 17: Importance of Wireless Network

Lecture 18: Is Wireless Network Truly Secure?

Lecture 19: History of Wireless Network

Lecture 20: Challenges Involved in Wireless Network

Lecture 21: Types of Wireless Network

03:12

This lecture will explain the definitions of the wireless security.

03:07

This lecture will discuss the importance of the wireless security.

02:09

This lecture will talk about how truly secure wireless security are.

07:16

This lecture will discuss the history of the wireless security.

01:56

This discussion will focus on some challenges in the wireless security.

06:49

This lecture will identify the types of wireless security.

.

Lecture outline:

0:00    Introduction to Types of Wireless Security
0:07    Wired Equivalent Privacy
2:32    Wi-Fi Protected Access
3:58    WPA2
4:26    Wi-Fi Protected Setup
5:58    802.1x
Section 3 - Quiz
6 questions
12 pages

This PDF file contains Section 3 of this course. You can download the complete e book at the end of this course.

Section 4: Wireless Vulnerabilities
00:23

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 24: Weaknesses in WEP

Lecture 25: Weaknesses in Encryuption Algorithm

Lecture 26: Weaknesses in Key Management

Lecture 27: Weaknesses in User Behavior

Lecture 28: Stealing User Devices

05:25

This lecture will discuss the weaknesses of WEP or Wired Equivalent Privacy.

05:12

This lecture will explain the weaknesses of encryption algorithms.

02:34

This discussion will focus on the weaknesses of key management.

01:47

This discussion will center on the weaknesses of user behavior.

02:21

This lecture will talk about the theft of user devices.

Section 4 - Quiz
6 questions
9 pages

This PDF file contains Section 4 of this course. You can download the complete e book at the end of this course.

Section 5: Security Issues with Wireless
00:23

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 31: Security Problems in Wireless

Lecture 32: Modes of Wireless Networking

Lecture 33: Ad-hoc Networking

Lecture 34: Infrastructure Networks

Lecture 35: Footprint the Wireless Network

Lecture 36: Passive Attack

Lecture 37: Authentication and Authorization

Lecture 38: Active Attacks and Denial of Service

01:18

This lecture will discuss some security issues concerning the wireless networking.

00:37

This discussion will focus on one of the security issues in wireless networking, namely modes of wireless networking.

01:31

This discussion will focus on one of the security issues in wireless networking, namely ad-hoc networks.

02:29

This discussion will focus on one of the security issues in wireless networking, namely infrastructure networks.

02:08

This discussion will focus on one of the security issues in wireless networking, namely footprints in the wireless network.

00:42

This discussion will focus on one of the security issues in wireless networking, namely passive attacks.

02:22

This discussion will focus on one of the security issues in wireless networking, namely authentication and authorization.

02:44

This discussion will focus on one of the security issues in wireless networking, namely active attacks and denial of service.

Section 5 - Quiz
6 questions
7 pages

This PDF file contains Section 5 of this course. You can download the complete e book at the end of this course.

Section 6: Securing Wireless Technology
00:24

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 41: The Mobility Advantage

Lecture 42: Modes of Unauthorized Access

Lecture 43: Securing Wireless Transmissions

Lecture 44: Securing Wireless Access Points

Lecture 45: Stone Wireless Client Devices

Lecture 46: Data Security on Wireless Networks

Lecture 47: Securing Wireless Networks

00:46

This discussion will discuss one of the technologies involved in securing wireless networks, specifically the mobility advantage.

10:13

This discussion will explain one of the technologies involved in securing wireless networks, specifically the modes of unauthorized access.

.

Lecture outline:

0:00    Introduction to Modes of Unauthorized Access
0:37    Accidental Association
1:34    Malicious Association
2:36    Ad-hoc Networks
4:37    Non-traditional Networks
5:04    Identity Theft
6:34    Man-in-the-middle Attacks
7:40    Denial of Service
9:02    Network Injection
9:37    Caffe Latte Attack
02:56

This discussion will explain one of the technologies involved in securing wireless networks, specifically wireless transmissions.

.

Lecture outline:

0:00    Three Basic Threats
0:10    Protecting the Confidentiality
1:53    Preventing the Alteration of
        Intercepted Communications
2:14    Countermeasures to Reduce the Risk
01:30

This discussion will explain one of the technologies involved in securing wireless networks, specifically wireless access points.

.

Lecture outline:

0:00    Introduction to Securing
        Wireless Access Points
0:21    Eliminating Rogue Access Points
0:43    Properly Configure All Access Points
1:03    Using 802.1x to Authenticate All Devices
00:42

This discussion will explain one of the technologies involved in securing wireless networks, specifically storing wireless client devices.

01:01

This discussion will explain one of the technologies involved in securing wireless networks, specifically data security.

03:24

This discussion will provide a general view of securing wireless networks.

.

Lecture outline:

0:00    Use of Encryption
0:34    Use Anti-virus and Anti-spyware
	Software and Firewall
0:56    Turn Off Identifier Broadcasting
1:27    Change the Identifier on the Router
2:07    Change Your Router's Pre-set Password
2:28    Allow Specific Computers to
	Access the Wireless Network
2:54    Turn off Wireless Network
3:11    Don't Assume Public Hotspots are Secure
Section 6 - Quiz
6 questions
11 pages

This PDF file contains Section 6 of this course. You can download the complete e book at the end of this course.

Section 7: Future of Wireless and Its Security
00:31

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 50: Introduction to the Future of Wireless

Lecture 51: Broader Broadband

Lecture 52: Tougher Radio Frequency Signals

Lecture 53: The Wi-Fi-Zation of Things

Lecture 54: Improved Security

Lecture 55: Cooperation with Non-Wi-Fi Networks

Lecture 56: Self Managing Wi-Fi Clients

Lecture 57: Improved Mobility via Smarter RF Management

Lecture 58: Personal Area Wi-Fi

12:02

This lecture will discuss the future of wireless networking.

01:28

This discussion will focus on one of possible future applications of wireless networking, namely broader broadband.

00:22

This discussion will focus on one of possible future applications of wireless networking, namely tougher radio frequency signals.

01:10

This discussion will focus on one of possible future applications of wireless networking, namely Wi-Fi-zation of things.

01:27

This discussion will focus on one of possible future applications of wireless networking, namely improved security.

01:10

This discussion will focus on one of possible future applications of wireless networking, namely cooperating with non-Wi-Fi networks.

02:02

This discussion will focus on one of possible future applications of wireless networking, namely self-managing Wi-Fi clients.

01:48

This discussion will focus on one of possible future applications of wireless networking, namely improved mobility.

01:18

This discussion will focus on one of possible future applications of wireless networking, namely having personal Wi-Fi areas.

Section 7 - Quiz
6 questions
11 pages

This PDF file contains Section 7 of this course. You can download the complete e book at the end of this course.

Section 8: Course Resources
126 pages

This e book contains the entire Wireless Security course in a PDF format.

3 pages

This e book is a list of terms and definitions often used in the field of Wireless Security.

7 pages

This PDF file contains all the answers to all the quizzes in each section of this course.

Section 9: Wireless Security Certification
1 page

Now that you've finished your Udemy course, - you are eligible to sit your official Certification exam.

Certification is not mandatory.

Once you've completed the course, email our exam department at exams@artofservice.com.au to purchase your exam voucher and sit your final exam.

. Access includes a step-by-step procedure on how to take the final exam and how to obtain your exam certification.

You will receive a PDF certificate through your email upon passing the examination.

1 page

We are always in the process of improving our courses and procedures for a better learning experience for our students. Your input is very important to us.

Follow the step-by-step procedure on taking the evaluation and receiving your certificate of completion.

01:27

A final message from our CEO.

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

The Art Of Service, Quality education for Career Driven IT Professionals

What drives us?

In one word? YOU

You are front, center and behind every decision we make in our business.

  • You are starting out in the IT industry
  • You are serious about your career
  • You need certifications on your resume to get that first interview

For you we created the Foundation level courses as well as the Core Series for IT

  • You are an IT Professional with a proven career
  • You need to stay in touch with changes in the industry
  • You need to continue to show your value to the business to ensure your job is secure
  • You want to find out what else would make your IT career more solid

For you we created the Specialist and Intermediate level courses as well as the Core Series for IT

  • You are implementing Processes and methodologies in your company
  • You are managing a team of people and need to look good
  • You started your own business and are looking for template documents to ‘hit the ground running’
  • You need to present on a subject at the next team meeting and are not quite sure where to start

For you we created the Toolkits as well as the Core Series for IT


Our motto:
Every Career driven IT Professional needs to be able to afford quality IT educational materials to stay relevant in their job, irrespective of current position, budget or geographical location.

We do most of the work behind the scenes so that you can focus on your professional education and your career within the IT industry.

We see it as our job to ensure we give you the most up to date information you need to succeed in achieving that goal at a price-point that is makes it accessible to most professionals.

Ready to start learning?
Take This Course