Companies Home Search Profile

Ethical Hacking: Wireless Networks

Focused View

Malcolm Shore

1:40:11

0 View
  • 01.01-learn how to protect your wireless network.mp4
    01:23
  • 01.02-what you should know before watching this course.mp4
    00:57
  • 01.03-course disclaimer.mp4
    01:37
  • 02.01-understanding wireless networks.mp4
    05:52
  • 02.02-selecting an antenna for wireless network testing.mp4
    05:16
  • 02.03-configuring security in wireless networks.mp4
    03:26
  • 02.04-understanding the wi-fi protected setup (wps).mp4
    05:20
  • 02.05-extracting wep passwords using wifite.mp4
    02:09
  • 02.06-extracting network passwords through wps.mp4
    02:35
  • 02.07-using wifite and aircrack-ng to test wpa passwords.mp4
    02:00
  • 02.08-using pixiedust to recover keys.mp4
    02:44
  • 02.09-a first look at wpa3.mp4
    02:26
  • 02.10-understanding dragonblood.mp4
    02:37
  • 03.01-harvesting connections with an evil twin.mp4
    02:17
  • 03.02-set up the wifi pineapple.mp4
    03:18
  • 03.03-harvest credentials with the wifi pineapple.mp4
    02:54
  • 03.04-capturing wpa handshakes.mp4
    00:51
  • 04.01-understanding bluetooth.mp4
    05:01
  • 04.02-scanning for bluetooth devices.mp4
    05:27
  • 04.03-legacy attacks using bluesnarfer.mp4
    02:56
  • 05.01-using fernwi-fi cracker.mp4
    02:35
  • 05.02-discovering networks with inssider.mp4
    02:20
  • 05.03-capturing wireless packets with acrylic analyzer.mp4
    08:24
  • 05.04-heat mapping with ekehau.mp4
    04:23
  • 05.05-wi-fi sniffing using wireshark.mp4
    04:45
  • 05.06-scanning with vistumbler.mp4
    04:46
  • 05.07-using commview to scan wi-fi networks.mp4
    05:56
  • 06.01-testing the internet of things.mp4
    04:38
  • 07.01-summary.mp4
    01:18
  • Description


    Wireless networks are convenient and popular, but poor configuration and encryption leave them open to attack. Hackers can use Wi-Fi vulnerabilities to infiltrate your entire network. Security professionals need to know how to detect, prevent, and counter these kinds of attacks using the latest tools and techniques—the subject of this course with cybersecurity expert Malcolm Shore. Malcolm covers everything from configuring basic security to understanding how hackers extract passwords, harvest connections at rogue access point, and attack networks via Bluetooth. He also explains how to select the right antennae for testing and introduces some sophisticated Windows and Linux tools to scan for vulnerabilities, including Acrylic, Ekahau, and Wireshark. By the end of the course, you should be able to shore up your wireless connections and gain confidence that your local network is safe to use.

    Note: This course is part of our test prep series for the Certified Ethical Hacker exam. Review the complete exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Malcolm Shore
    Malcolm Shore
    Instructor's Courses
    Wide range of IT experience ranging from systems programming to policy and strategic planning. Strong expertise in applied IT security, focused on policy and governance. Teaching post graduate security (forensics, information warfare, security management, applied cryptography) Past interests include virtual worlds and web3d developments. Current work focusing on Cloud, security architectures, and national-level cybersecurity Specialties: SABSA, Cloud, Cryptography, Cybersecurity Strategy, Network Survivability
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 29
    • duration 1:40:11
    • Release Date 2024/10/14