Companies Home Search Profile

Ethical Hacking: Hacking Wireless Networks

Focused View

Dale Meredith

3:36:11

179 View
  • 1. Course Overview.mp4
    02:09
  • 01. The Method to My Madness.mp4
    01:52
  • 02. CEH Exam Study Tips.mp4
    06:28
  • 03. Key Terms.mp4
    09:31
  • 04. Advantages and Disadvantages.mp4
    06:19
  • 05. Types of Wi-Fi Networks.mp4
    02:02
  • 06. Standards.mp4
    10:06
  • 07. Wi-Fi Authentication Modes.mp4
    03:16
  • 08. Chalking.mp4
    04:53
  • 09. Antenna Types.mp4
    08:36
  • 10. Learning Check.mp4
    01:57
  • 1. WEP Encryption.mp4
    04:38
  • 2. WPA and WPA2 Encryption.mp4
    09:32
  • 3. WPA3 - The New Kid on the Block.mp4
    05:04
  • 4. Breaking Encryption.mp4
    07:32
  • 5. Defense Measures.mp4
    02:34
  • 6. Demo - Examining the Encryption Options.mp4
    04:03
  • 7. Learning Check.mp4
    01:33
  • 1. Type of Attacks.mp4
    12:26
  • 2. Demo - WarDriving.mp4
    07:29
  • 3. Access Point Attacks.mp4
    05:12
  • 4. Demo - Looking Known Networks.mp4
    03:30
  • 5. Client Attacks.mp4
    07:06
  • 6. Learning Check.mp4
    02:06
  • 01. Step 1 - Discovery.mp4
    04:30
  • 02. Demo - Finding WPS-enabled APs.mp4
    04:21
  • 03. Step 2 - GPS Mapping.mp4
    05:00
  • 04. Step 3 - Wireless Traffic Analysis.mp4
    05:44
  • 05. Demo - Using Your Phone and Wi-Fi Analyzer.mp4
    02:23
  • 06. Step 4 - Launching an Attack.mp4
    01:49
  • 07. Demo - Finding Hidden SSIDs.mp4
    01:49
  • 08. Evil Twin Attacks.mp4
    01:35
  • 09. Demo - Evil Twins.mp4
    08:43
  • 10. Wi-Jacking Attack.mp4
    01:56
  • 11. Step 5 - Cracking Encryption.mp4
    01:37
  • 12. Demo - Cracking WPA Using Aircrack-ng.mp4
    09:31
  • 13. Learning Check.mp4
    02:03
  • 1. Explaining Bluetooth.mp4
    03:09
  • 2. Methods of Attack.mp4
    04:53
  • 3. Bluetooth Threats.mp4
    01:49
  • 4. Demo - Using BluetoothView to Scan for Devices.mp4
    02:45
  • 5. Learning Check.mp4
    01:30
  • 1. The Six Layers of Security.mp4
    02:28
  • 2. Defending WPAs.mp4
    03:24
  • 3. Stopping KRACK and aLTEr Attacks.mp4
    02:01
  • 4. Countermeasures for Rogue APs.mp4
    01:26
  • 5. Overall Best Practices.mp4
    03:00
  • 6. Bluetooth Attack Countermeasures.mp4
    02:09
  • 7. Learning Check.mp4
    02:51
  • 1. Domain Summary.mp4
    03:51
  • Description


    Wireless provides one of the biggest attack vectors for hackers. This course will teach you how to secure wireless networks needed for the CEH 312-50 exam.

    What You'll Learn?


      Wireless technologies have changed our world, but it’s also given hackers another attack vector . In this course, Ethical Hacking: Wireless Hacking, you’ll learn to look at your wireless infrastructures the way attackers do and what you can do to protect your organization using the skills of an Ethical Hacker. First, you’ll explore the concepts of wireless technologies, from transmission types to antenna types. Next, you’ll discover the threats and methodologies used by hackers to attack your networks. Finally, you’ll learn how to [protect your wireless infrastructures with countermeasures. When you’re finished with this course, you’ll have the skills and knowledge of ethical hacking needed for the CEH 312-50 exam.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Dale Meredith
    Dale Meredith
    Instructor's Courses
    Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material. Straddling the line of fun and function, Dale's instruction is memorable and entertaining. Dale's knowledge and understanding of current trends in technology and applications have led to many opportunities, such as: training various Inc 500 companies, universities, and Divisions of the Department of Homeland Security for the United States government. Along with authoring for Pluralsight, consulting, and IT classroom training, you can catch Dale on stage speaking at IT conferences, helping IT teams keep their companies safe, relevant, and "breach" aware. Outside of the professional sphere, Dale spends quite a bit of his time giving back by speaking at adult and youth non-profit community gatherings and posting on his 'Dale Dumbs IT Down' social media sites. Dale uses these speaking engagements and social media sites to 'Dumb Down IT' concepts with the intent to help everyone be safe and smart with their technology and personal devices. Dale also specializes in Active Directory, Exchange Server, IIS, PowerShell, SharePoint, System Center/Desktop Deployment, and Private Cloud
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 50
    • duration 3:36:11
    • level average
    • English subtitles has
    • Release Date 2023/01/08