YoVDO

Wireless Overview - Protocols & Threat Models

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Wireless Security Courses Threat Models Courses

Course Description

Overview

Explore the landscape of wireless protocols and associated threat models in this comprehensive Black Hat USA 2002 conference talk. Delve into the intricacies of various wireless technologies, understanding their underlying mechanisms and potential vulnerabilities. Gain valuable insights into the security challenges posed by wireless communications and learn about the different attack vectors that malicious actors may exploit. Analyze real-world scenarios and case studies to better comprehend the risks and mitigation strategies in wireless environments. Equip yourself with the knowledge to assess and enhance the security posture of wireless networks, making informed decisions to protect against potential threats in an increasingly connected world.

Syllabus

Black Hat USA 2002 - Wireless Overview: Protocols & Threat Models


Taught by

Black Hat

Related Courses

Secure Software Development Fundamentals
Linux Foundation via edX
Security Literacy Course (How To)
Treehouse
Lessons Learned from Evaluating the Robustness of Defenses to Adversarial Examples
Simons Institute via YouTube
Security Protection and Quality Control in Crowdsourcing
CAE in Cybersecurity Community via YouTube
Cross-App Poisoning in Software-Defined Networking
Association for Computing Machinery (ACM) via YouTube