Wireless Intrusion Detection Systems with the Raspberry Pi
Offered By: YouTube
Course Description
Overview
Explore wireless intrusion detection systems using Raspberry Pi in this conference talk from GrrCON 2015. Learn about security tools, the importance of wireless scans, and real-time vs. snapshot monitoring. Discover hardware specifications, cost comparisons, and practical demonstrations using Raspberry Pi B, B+, and Pi2. Gain insights into system limitations, configuration scripts, and potential future developments in this field.
Syllabus
Intro
Why are you here? Security tools
Why Do Wireless Scans?
Real Time vs Snap Shots
Hardware Specs
Cost Comparison
Hardware Cost for 6 Drones
EMU Roosevelt Hall
Have I placate the Demo Gods? Live Demo time
Hardware Limitations
System Failure Hardware: Raspberry Pi B, B+ and Pi2
Problems Moving to Pi2 / Kali 2.0.1
Configuration Scripts
Future Things to Test
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network