INE – Certified Wireless Security Professional (CWSP) Technology Course

INE – Certified Wireless Security Professional (CWSP) Technology Course
English | Size: 367.96 MB
Category: Security | Wireless

Module 1 – WLAN Security Basics: This module discusses the need for Wi-Fi security and provides the background of decision and standards making bodies. It also discusses 802.11 in the Enterprise. Module 2 – Wifi Attack Vectors: This module discusses typical modes of attack on Wi-fi implementations. It also underlines the fact that different attack methods expose the vulnerability of the Wi-Fi network. Module 3 – 802.11 Security Design Considerations: This module describes the need for performing a risk assessment as well as establishing a security policy. [Read more…]

Kali Linux 2017 Wireless Penetration Testing for Beginners

Kali Linux 2017 Wireless Penetration Testing for Beginners
English | Size: 724.70 MB
Category: CBTs

Kali Linux is rated as the #1 security operating system for hackers. With the Linux operating system and its core structure based on Debian, it comes jam-packed with all the tools you need to penetration-test your websites. Kali Linux has gained popularity over the last few years with the rise of hacker groups (Anonymous, Lizard Squad, Ghost Squad Hackers, and others). [Read more…]

Livelessons Wireshark for Wireless LANs

Livelessons Wireshark for Wireless LANs
English | Size: 3.52 GB
Category: CBTs

Rough Cuts / Sneak Peek:
The Rough Cuts/Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.
[Read more…]

LiveLessons – Wireless Networks, IoT and Mobile Devices Hacking (The Art of Hacking Series)

LiveLessons – Wireless Networks, IoT and Mobile Devices Hacking (The Art of Hacking Series)
English | Size: 1.69 GB
Category: CBTs

Wireless Networks, IoT, and Mobile Devices Hacking provides step-by-step real-life, advanced scenarios of performing security assessments (penetration testing) of wireless networks and how to perform security posture assessments of Internet of Things (IoT) technologies and solutions. You also learn how to perform security posture assessments of mobile devices, such as smartphones, tablets, and wearables. [Read more…]

Pluralsight – Security, Collaboration, and Wireless Network Design for CCDA DESGN (200-310)

Pluralsight – Security, Collaboration, and Wireless Network Design for CCDA DESGN (200-310)
English | Size: 146.66 MB
Category: Cisco | Networking

This course is designed for network engineers interested in deploying firewalls, telephony or wifi in their designs.
At the beginning of every network life sits a network designer who must weigh the requirements of the future network applications and put forth a design that will fulfill those requirements with the resources available. This course, Security, Collaboration, and Wireless Network Design for CCDA DESGN (200-310), deals with some more esoteric options available compared to standard switching and routing. First, you’ll look at the security landscape in regards to threats, policies, and equipment available. [Read more…]

Pluralsight – Wireless Network Penetration Testing Advanced Techniques

Pluralsight – Wireless Network Penetration Testing Advanced Techniques
English | Size: 153.54 MB
Category: Tutorial

As attackers shift their techniques to attack not only technology but people, it is imperative that you are as vigilant as ever. In this course, Wireless Network Penetration Testing Advanced Techniques, you’ll focus on red teaming attacks so that you can identify the weaknesses in your own wireless networks and stop a potential compromise from ever occurring. First, you’ll delve into rogue access points and fake captive portals.
[Read more…]

Wireless Hacking and Security Course

Wireless Hacking and Security Course
English | Size: 689.52 MB
Category: CBTs

This VTC course delivers an in-depth look at wireless security, demonstrating how IEEE 802.11 wireless attacks are carried out and defended against. Veteran instructor Bobby Rogers first provides a foundation in wireless security technologies before he proceeds with practical demonstrations on securing both clients and network devices. He also demonstrates how to monitor wireless networks, capture wireless traffic, and even crack WEP and WPA keys [Read more…]

Lynda – IoT Foundations – Low-Power Wireless Networking

Lynda – IoT Foundations – Low-Power Wireless Networking
English | Size: 356.58 MB
Category: Tutorial

The Internet of Things (IoT) has been significantly driven by the increasing number of networked devices with ubiquitous wireless connectivity. Low-power wireless networking is one of the most important connectivity technologies required by today’s IoT systems, ranging from smart home appliances to smart city systems. In this course, explore the key technologies and foundations of low-power wireless networking for IoT. Ryan Hu begins by introducing wireless networking for IoT, and going over the basics of wireless communication and wireless networking. Next, he presents and compares the underlying wireless networking technologies in terms of system architectures, communication paradigms, performance, and use cases. Then, he explains how to integrate various networking technologies into an IoT system. To wrap up, Ryan discusses the use of low-power wireless networking in a typical lighting control system for both smart home and smart city environments. [Read more…]

Pluralsight – Wireless Network Penetration Testing

Pluralsight – Wireless Network Penetration Testing
English | Size: 123.90 MB
Category: CBTs

Virtually every company has wireless networks, making for an attractive target to attackers. This course will teach you how to perform a penetration test in wireless networks.
Wireless networks are everywhere but are they really secure? How easy would it be for an attacker to hack into your network? In this course, Wireless Network Penetration Testing, you’ll learn about the most common attack techniques against wireless networks. First, you’ll explore the wireless penetration test process. Next, you’ll discover how to gather information about your target. With the information gathered, you’ll learn how to exploit the most common wireless networks technologies, such as: WEP, WPA, WPA2, and WPS. [Read more…]

BackTrack 5 Wireless Penetration Testing

BackTrack 5 Wireless Penetration Testing
English | Size: 531.51 MB
Category: Tutorial

Wi-Fi is a popular technology that helps satisfy our need for continuous connectivity with some inherent security risks and vulnerabilities. In a society with an increasing level of discoveable Wi-Fi networks, wireless penetration testing allows you to verify whether your own networks are as secure as you’d like them to be.
[Read more…]