O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Wireless Hacking and Security

Video Description

This VTC course delivers an in-depth look at wireless security, demonstrating how IEEE 802.11 wireless attacks are carried out and defended against. Veteran instructor Bobby Rogers first provides a foundation in wireless security technologies before he proceeds with practical demonstrations on securing both clients and network devices. He also demonstrates how to monitor wireless networks, capture wireless traffic, and even crack WEP and WPA keys. To begin learning today, simply click on the movie links.

Table of Contents

  1. Introduction
    1. Welcome 00:01:43
    2. Course Outline 00:05:12
  2. Overview of Wireless Networking
    1. Wireless Terminology 00:04:15
    2. Wireless Basics 00:04:09
    3. Wireless Hardware 00:04:27
    4. Wireless Transmission Methods 00:03:14
    5. 802.11 Standards pt. 1 00:04:40
    6. 802.11 Standards pt. 2 00:04:17
    7. Other Standards 00:02:42
    8. Wireless Topologies 00:04:47
  3. Wireless Security Basics
    1. Wireless vs Wired Networks 00:02:51
    2. Wireless Security Issues 00:03:38
    3. Encryption 00:03:14
    4. Authentication 00:05:41
    5. SSID Broadcasting 00:04:36
    6. MAC Address Filtering 00:05:34
  4. Wireless Security Protocols
    1. WEP 00:05:53
    2. WPA 00:03:52
    3. WPA2 00:04:21
    4. 802.1x 00:04:10
    5. EAP 00:04:53
    6. WAP 00:05:03
    7. Authentication Methods 00:05:28
  5. Securing Desktop Clients
    1. General Client Security 00:06:47
    2. Legacy Clients 00:04:58
    3. Securing Windows 7 and 8 00:06:31
    4. Securing a Linux Client 00:06:02
    5. Physical Security 00:06:45
    6. Security Policies and Enforcement 00:06:27
  6. Wireless Access Points
    1. Securing WAPs pt. 1 00:04:01
    2. Securing WAPs pt. 2 00:05:18
    3. Securing WAP Traffic pt. 1 00:06:52
    4. Securing WAP Traffic pt. 2 00:06:01
    5. Securing Client Access 00:04:51
    6. AP Physical Security 00:05:28
  7. Mobile Wireless
    1. Securing Smartphones 00:07:05
    2. Securing Tablets 00:03:51
    3. WiMAX 00:05:42
    4. ZigBee 00:05:53
    5. RFID 00:04:13
  8. Securing Bluetooth
    1. Overview of Bluetooth 00:04:27
    2. Bluetooth Weaknesses 00:03:45
    3. Bluetooth Security Features 00:05:19
    4. Bluetooth Attacks 00:03:48
    5. Bluetooth Attack Tools 00:05:24
    6. Securing Bluetooth 00:03:49
  9. Hacking Basics
    1. Intro to Penetration Testing 00:05:29
    2. Wardriving and Warchalking 00:04:41
    3. Methodology 00:06:15
    4. Goals 00:06:14
    5. Planning the Test 00:06:41
    6. Conducting the Test 00:05:54
    7. Professional Conduct 00:06:15
  10. Wireless Security Tools
    1. Intro to Security Tools 00:04:54
    2. Hardware 00:06:19
    3. Pen Testing Platforms 00:06:16
    4. Backtrack Toolset 00:05:41
    5. Kismet 00:04:21
    6. Aircrack-ng 00:06:25
    7. Gerix 00:05:58
    8. Wireshark 00:06:14
    9. Net Stumbler 00:04:16
    10. Modern Windows Tools 00:06:24
    11. Other Tools 00:04:51
  11. Wireless Security Testing Section One
    1. Setting Up Hardware 00:06:54
    2. Verifying Hardware 00:05:08
    3. Monitor Mode pt. 1 00:04:19
    4. Monitor Mode pt. 2 00:03:53
    5. Scanning 00:05:30
    6. Capturing Traffic pt. 1 00:06:00
    7. Capturing Traffic pt. 2 00:04:46
    8. Viewing Traffic Captures pt. 1 00:05:05
    9. Viewing Traffic Captures pt. 2 00:06:59
  12. Wireless Security Testing Section Two
    1. WEP Attacks 00:03:15
    2. Aireplay-ng Attacks 00:06:00
    3. Fake Authentication 00:04:33
    4. Deauthentication Attacks 00:05:50
    5. ARP Replay Attacks 00:05:22
    6. Cracking WEP pt. 1 00:04:58
    7. Cracking WEP pt. 2 00:05:46
  13. Wireless Security Testing Section Three
    1. WPA Attacks 00:02:41
    2. Cracking WPA pt. 1 00:02:30
    3. Cracking WPA pt. 2 00:03:38
    4. Rogue APs 00:06:06
    5. Detecting Rogue APs 00:04:11
    6. Attacking Past Wireless 00:06:24
  14. Legal Issues
    1. Intro to Legal Issues 00:03:49
    2. Laws and Regulations pt. 1 00:06:22
    3. Laws and Regulations pt. 2 00:06:19
    4. Laws and Regulations pt. 3 00:06:30
    5. Liability 00:06:31
  15. Wireless Security Best Practices
    1. Wireless Security Standards 00:05:27
    2. Designing the Network 00:06:10
    3. Configuring Wireless Clients 00:05:28
    4. Configuring Access Points 00:05:45
    5. Securing Users 00:05:05
    6. Connecting Different Networks 00:05:53
    7. Corporate Policies 00:04:58
    8. Security Testing 00:05:23
  16. Conclusion
    1. Resources 00:03:26
    2. Wireless Tools 00:07:12
    3. Certifications 00:03:44
    4. Course Wrap Up 00:03:13
  17. Credits
    1. About the Author 00:01:24