YoVDO

Hunting and Tracking Rogue Radio Frequency Devices

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Network Security Courses Wireless Communications Courses Threat Detection Courses

Course Description

Overview

Explore the dangers of rogue radio frequencies and learn tactics, techniques, and tools for identifying and locating potential threats in this 50-minute RSA Conference talk. Gain insights into the major ways rogue wireless frequencies can impact organizations, develop a basic understanding of locating rogue wireless signals, and acquire conversational knowledge of wireless signal identification and tracking methods. Discover real-life examples of common RF attacks, including user impersonation, wireless phishing, and device tracking. Delve into wireless attacks beyond WiFi, such as gate and door opening exploits and jamming attacks. Learn about radio frequency measurement, wave propagation, and penetration. Understand the differences between triangulation and trilateration for tracking down rogue access points. Acquire knowledge on wireless protections and how to find suitable solutions for your company. This talk is suitable for those with a basic understanding of security principles, wireless communication, and computer networks.

Syllabus

Intro
Story Time
Questions to ask yourself...
Benefits of wireless attacks
Real Life Examples of common RF attacks
User Impersonation & Wireless Phishing
Attackers gather lots of Data
Collecting Device and User Metadata
Tracking People and Devices
Wireless Attacks extend past WiFi
Opening Gates & Doors
Jamming Attacks
Detecting and Locating
How do we measure Radio Frequencies?
Example Radio Frequencies
Radio Wave Propagation & Penetration
Okay nerd, so what?
Triangulation vs Trilateration
Tracking down rogue access points
How to find a solution for your company?
Wireless Protections
Apply What You Have Learned Today


Taught by

RSA Conference

Related Courses

Master Mathematical Cryptography 2020: Crack Any Code
Udemy
Cryptography from Scratch| Master Cryptography in Java
Udemy
Information Security in Python
Udemy
Cryptography
Caleb Curry via YouTube
Linux for Programmers - Public-Private Key Authentication (RSA) and FTP
Tech with Tim via YouTube