Curriculum For This Course
Video tutorials list
-
Course Introduction
Video Name Time 1. Introduction 01:35 2. Instructor Introduction 01:42 -
Module 01 - WLAN Security Overview
Video Name Time 1. WLAN Security Overview 01:40 2. Where We Came From 02:26 3. Standards Organizations 01:31 4. ISO and the OSI 10:25 5. ISOC Hierarchy 03:00 6. Wi-Fi Alliance Standards 07:02 7. 802.11 Networking Basics Part1 01:28 8. 802.11 Networking Basics Part2 02:43 9. Connection Types 02:08 10. 802.11 Security Basics 01:54 11. Data Privacy Part1 01:48 12. Data Privacy Part2 03:14 13. AAA 01:33 14. Segmentation 03:46 15. Monitoring 01:42 16. Policy 01:19 17. Security History 00:51 18. 802.11i and WPA Part1 00:45 19. 802.11i and WPA Part2 01:37 20. 802.11i and WPA Part3 02:35 21. RSN (Robust Security Network) 00:54 22. Future of 802.11 Security Part1 01:44 23. Future of 802.11 Security Part2 01:30 24. Demo - Networking Basics 04:45 25. Demo - Web GUI Introduction 05:13 26. Demo - Security Options 03:13 27. Module 01 Review 00:49 -
Module 02 - Legacy Security
Video Name Time 1. Legacy Security 00:48 2. Authentication 01:00 3. Open System Authentication 02:31 4. WEP Encryption 04:09 5. Shared Key Authentication 02:26 6. More About WEP Part1 06:05 7. More About WEP Part2 08:58 8. Attacks Against WEP 06:19 9. VPNs Part1 03:26 10. VPNs Part2 06:19 11. VPN Tunneling Protocols 01:49 12. MAC Filters 02:36 13. SSID Segmentation 04:26 14. SSID Cloaking 01:58 15. Demo - Security Associations 09:39 16. Demo - Security Associations Part A 04:39 17. Demo - Security Associations Part B 05:00 18. Demo - MAC Spoofing 06:49 19. Module 02 Review 00:40 -
Module 03 - Encryption Ciphers and Methods
Video Name Time 1. Encryption Ciphers and Methods 00:37 2. Encryption Basics 08:18 3. Stream and Block Ciphers 06:00 4. WLAN Encryption Methods 03:08 5. WEP Again 01:02 6. TKIP Part1 06:54 7. TKIP Part2 07:31 8. MIC 06:59 9. TKIP MPDU 05:02 10. CCMP Part1 03:49 11. CCMP Part2 04:07 12. CCMP Part3 03:23 13. CCMP Part4 02:24 14. CCMP Part5 03:45 15. WPA/WPA2 01:15 16. Proprietary Solutions 00:51 17. Demo - Encryption Example 06:27 18. Module 03 Review 00:23 -
Module 04 - 802.11 Authentication Methods
Video Name Time 1. 802.11 Authentication Methods 00:43 2. WLAN Authentication Overview 08:00 3. AAA 02:36 4. Authentication 07:11 5. Authorization 03:20 6. Accounting 04:45 7. 802.1X 05:04 8. Supplicant Credentials 07:26 9. Authentication Server Credentials 08:02 10. EAP 04:23 11. EAP Process 05:50 12. Legacy EAP 03:54 13. Strong EAP Protocols 04:48 14. PACs 04:46 15. Demo - Certificate Authority Server Credentials 05:51 16. Module 04 Review 00:41 -
Module 05 - Dynamic Encryption Key Generation
Video Name Time 1. Dynamic Encryption Key Generation 01:07 2. Dynamic WEP 05:59 3. RSN 06:44 4. Management Frames & RSNIE (eNotes) 06:30 5. RSN (Cont.) 01:11 6. Authentication and Key Management (AKM) Part1 04:22 7. Authentication and Key Management (AKM) Part2 05:14 8. Authentication and Key Management (AKM) Part3 00:43 9. Authentication and Key Management (AKM) Part4 02:41 10. RSNA Key Hierarchy 02:23 11. Master Session Key (MSK) 02:23 12. 4-Way Handshake 03:17 13. Steps of the 4 -way Handshake 00:51 14. Group Key Handshake 01:07 15. PeerKey Handshake 02:00 16. Demo - EAP 05:35 17. Demo - Information Elements 06:39 18. Module 05 Review 00:57 -
Module 06 - SOHO 802.11 Security
Video Name Time 1. SOHO 802.11 Security 00:25 2. Introduction 04:48 3. Why a Passphrase 07:32 4. 4-Way Handshake Again 05:54 5. Risks of WPA/WPA2 04:49 6. Another Risk Factor of WPA/2 03:04 7. Wi -Fi Protected Setup (WPS) Part1 02:32 8. Wi -Fi Protected Setup (WPS) Part2 04:25 9. Wi -Fi Protected Setup (WPS) Part3 00:26 10. Wi -Fi Protected Setup (WPS) Part4 03:34 11. Wi -Fi Protected Setup (WPS) Part5 01:02 12. Initial WLAN Setup 01:40 13. SOHO Best Practices 05:56 14. Demo - Cracking Hashes 09:37 15. Module 06 Review 00:39 -
Module 07 - Fast Secure Roaming
Video Name Time 1. Fast Secure Roaming 01:07 2. History of 802.11 Roaming 04:11 3. Client Roaming Thresholds 03:02 4. AP to AP Handoff (e -notes 09:10 5. Re -Association 02:01 6. Types of APs 03:09 7. RSNA Review 01:46 8. PMKSA 07:47 9. PMK Caching 01:58 10. Pre -authentication 03:29 11. Opportunistic Key Caching (OKC) 10:01 12. Proprietary FSR 06:03 13. FT Key Hierarchy (e -notes) 09:08 14. FT Initial Mobility Domain Association 02:17 15. Over the Air Fast BSS Transition (e -notes) 06:07 16. Over the Air DS Fast BSS Transition (e - notes) 12:25 17. 802.11K -2008 03:51 18. L3 Roaming 10:43 19. Mobile IP 04:46 20. Troubleshooting 03:35 21. Voice Personal and Voice Enterprise 04:51 -
Module 08 - Wireless Security Risks
Video Name Time 1. Wireless Security Risks 00:42 2. Introduction 00:26 3. Rogue Devices Part1 09:12 4. Rogue Devices Part2 03:43 5. Rogue Prevention 03:13 6. Eavesdropping 04:41 7. Authentication Attacks 01:16 8. DoS 01:11 9. L2 DoS 01:11 10. 802.11w 00:53 11. MAC Spoofing 01:48 12. Wireless Hijacking 02:43 13. Peer -to -Peer Attacks 01:49 14. Management Interface Exploits 02:42 15. Physical Damage and Theft 00:40 16. Social Engineering 00:46 17. Public Access and WLAN Hotspots 00:38 18. Demo - Rogue Devices 04:26 19. Demo - Public Hotspots 06:32 20. Module 08 Review 00:30 -
Module 09 - Wireless LAN Security Auditing
Video Name Time 1. Wireless LAN Security Auditing 00:19 2. Purpose of Auditing 01:27 3. WLAN Audits Part1 01:52 4. WLAN Audits Part2 00:46 5. Layer 1 Audit 05:13 6. Layer 2 Audit 02:13 7. Penetration Testing 03:57 8. Wired Infrastructure Audit 03:07 9. Social Engineering 01:47 10. WIPS Audit 00:52 11. Documenting the Audit 04:10 12. Recommendations 00:43 13. WLAN Security Auditing Tools 01:32 14. Module 09 Review 00:23 -
Module 10 - Wireless Security Monitoring
Video Name Time 1. Wireless Security Monitoring 00:45 2. WIDS/WIPS 01:02 3. WIDS/WIPS continue 06:23 4. Sensor Placement 03:57 5. Example of Rogue Detection (e -notes) 08:57 6. Device Tracking 06:53 7. Signature Analysis 01:04 8. Behavioral Analysis 02:22 9. Other Types of Monitoring 05:57 10. More on Monitoring 00:52 11. Module 10 Review 00:24 -
Module 11 - VPNs, Remote Access and Guest Access Services
Video Name Time 1. VPNs, Remote Access and Guest Access Services 00:34 2. VPN Review Part1 11:18 3. VPN Review Part2 11:00 4. Remote Access Part1 06:20 5. Remote Access Part2 07:22 6. Module 11 Review 00:22 -
Module 12 - WLAN Security Infrastructure
Video Name Time 1. WLAN Security Infrastructure 00:39 2. WLAN Architecture 07:35 3. Lightweight or Controller Based APs (e-notes) 08:16 4. Other Controller Based Definitions 14:08 5. Device Management 06:58 6. Management Protocols 06:49 7. Controller Communications 05:26 8. Authorization Servers 03:13 9. Deployment Architectures 07:40 10. Other RADIUS Solutions 04:48 11. RBAC 04:18 12. Other Security Systems 06:18 13. Module 12 Review 00:23 -
Module 13 - Wireless Security Policies
Video Name Time 1. Wireless Security Policies 00:21 2. General Policy Part1 02:13 3. General Policy Part2 04:15 4. Policy Creation 03:13 5. Policy Management 02:26 6. Functional Policy 02:52 7. Password Policy 01:40 8. Other Policies Part1 03:33 9. Other Policies Part2 02:18 10. Government and Industry Regulations 06:20 11. Module 13 Review 00:25 12. Course Closure 01:47
Add Comment