YoVDO

Ethical Hacking: Hacking Wireless Networks

Offered By: Pluralsight

Tags

Ethical Hacking Courses Wireless Security Courses

Course Description

Overview

Wireless provides one of the biggest attack vectors for hackers. This course will teach you how to secure wireless networks needed for the CEH 312-50 exam.

Wireless technologies have changed our world, but it’s also given hackers another attack vector . In this course, Ethical Hacking: Wireless Hacking, you’ll learn to look at your wireless infrastructures the way attackers do and what you can do to protect your organization using the skills of an Ethical Hacker. First, you’ll explore the concepts of wireless technologies, from transmission types to antenna types. Next, you’ll discover the threats and methodologies used by hackers to attack your networks. Finally, you’ll learn how to [protect your wireless infrastructures with countermeasures. When you’re finished with this course, you’ll have the skills and knowledge of ethical hacking needed for the CEH 312-50 exam.

Syllabus

  • Course Overview 2mins
  • Comparing Wireless Terminologies 55mins
  • Summarizing Wireless Encryption 34mins
  • Appraising Wireless Threats 37mins
  • Illustrating the Wireless Attack Methodology 51mins
  • Explaining Bluetooth Hacking 14mins
  • Distinguishing Wireless Countermeasures 17mins
  • Domain Summary 3mins

Taught by

Dale Meredith

Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX