Ethical Hacking: Hacking Wireless Networks
Offered By: Pluralsight
Course Description
Overview
Wireless provides one of the biggest attack vectors for hackers. This course will teach you how to secure wireless networks needed for the CEH 312-50 exam.
Wireless technologies have changed our world, but it’s also given hackers another attack vector . In this course, Ethical Hacking: Wireless Hacking, you’ll learn to look at your wireless infrastructures the way attackers do and what you can do to protect your organization using the skills of an Ethical Hacker. First, you’ll explore the concepts of wireless technologies, from transmission types to antenna types. Next, you’ll discover the threats and methodologies used by hackers to attack your networks. Finally, you’ll learn how to [protect your wireless infrastructures with countermeasures. When you’re finished with this course, you’ll have the skills and knowledge of ethical hacking needed for the CEH 312-50 exam.
Wireless technologies have changed our world, but it’s also given hackers another attack vector . In this course, Ethical Hacking: Wireless Hacking, you’ll learn to look at your wireless infrastructures the way attackers do and what you can do to protect your organization using the skills of an Ethical Hacker. First, you’ll explore the concepts of wireless technologies, from transmission types to antenna types. Next, you’ll discover the threats and methodologies used by hackers to attack your networks. Finally, you’ll learn how to [protect your wireless infrastructures with countermeasures. When you’re finished with this course, you’ll have the skills and knowledge of ethical hacking needed for the CEH 312-50 exam.
Syllabus
- Course Overview 2mins
- Comparing Wireless Terminologies 55mins
- Summarizing Wireless Encryption 34mins
- Appraising Wireless Threats 37mins
- Illustrating the Wireless Attack Methodology 51mins
- Explaining Bluetooth Hacking 14mins
- Distinguishing Wireless Countermeasures 17mins
- Domain Summary 3mins
Taught by
Dale Meredith
Related Courses
Real world Hacking & Penetration testing: Version-1Udemy Hacking Laboratuvarınızı Oluşturun
Udemy Ethical Hacking: Denial of Service
LinkedIn Learning Ethical Hacking: Wireless Networks
LinkedIn Learning Cisco ISE v2.4 Video Training
Udemy