VPNs and Wireless Networks
Offered By: Pluralsight
Course Description
Overview
Pluralsight is not an official partner or accredited training center of EC-Council. In this course you'll learn about configuring VPNs, Wi-Fi, and Bluetooth, and ways to reduce associated risks.
Pluralsight is not an official partner or accredited training center of EC-Council. There are various VPN, Wi-Fi, and Bluetooth configurations, some of which are more secure than others. In this course, VPNs and Wireless Networks, you'll gain the ability to configure these technologies while minimizing security risks. First, you'll learn about VPN types, configurations, and best practices. Next, you'll discover how to maximize Wi-Fi network usage and performance. Finally, you'll explore Wi-Fi and Bluetooth threats with hands-on experience cracking a WPA2 passphrase using a dictionary attack. When you're finished with this course, you'll have the skills and knowledge of various wireless networks needed to maximize your security.
Pluralsight is not an official partner or accredited training center of EC-Council. There are various VPN, Wi-Fi, and Bluetooth configurations, some of which are more secure than others. In this course, VPNs and Wireless Networks, you'll gain the ability to configure these technologies while minimizing security risks. First, you'll learn about VPN types, configurations, and best practices. Next, you'll discover how to maximize Wi-Fi network usage and performance. Finally, you'll explore Wi-Fi and Bluetooth threats with hands-on experience cracking a WPA2 passphrase using a dictionary attack. When you're finished with this course, you'll have the skills and knowledge of various wireless networks needed to maximize your security.
Syllabus
- Course Overview 1min
- Securing Virtual Private Networks 49mins
- Maximizing Wi-Fi Efficiency 20mins
- Implement Wireless Security 27mins
Taught by
Daniel Lachance
Related Courses
Stealthily Access Your Android Phones - Bypass the Bluetooth AuthenticationBlack Hat via YouTube For the Love of Money - Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems
44CON Information Security Conference via YouTube IoT and the Security of That Mobile App - Mark Loveless
LASCON via YouTube Fuzzing the Phone in the iPhone
media.ccc.de via YouTube BrokenMesh - New Attack Surfaces of Bluetooth Mesh
Black Hat via YouTube