1. ▄▄▄ ▄▄▄
  2. █████▄ ▄▄▄ ▄█████
  3. ▄▄▄▄ ▀█████ ▄▄█▓█████▄▄ █████ ▄▄▄ ▄▄▄▄
  4. ▄██████████▄████▓ █████████████ ████ ▄█████ ██████
  5. ███▓▀▀▀▀█████▓████ █████▀ ▀████▓ ▓███ ▄██▄ █████▓ ▓██████
  6. ░▓███▄ ▄████ ████ █████▓ ▓█████▓███ ████ ██████▄ ▄██████▓
  7. ████████████▀ ████ █████ █████████ ████▄██▄███████▄███▀████▓
  8. ▀███▄ ▄▄▄ ▄████▀ ▓████ █████████ ████████▓███ ▀██▓▀ ████
  9. ▀███▄████▄█████ ██████ ████▓█████▄▓████ ▀▀ ████ ▀ ████
  10. ▄████▄ ▀▀████████▓ ███████ ▓▓██▀███▀ ▀██████▄██▄ ███ ████
  11. █████████ ▀█▓▀ █████▄▄ ░▓███████▄▄▄████▄██▓ ▀████████████ ████
  12. ██████████▄ ▄▄ ▀▀█████▄▄▓████▀███████▀▄███ ▄▄ ████████████ ▓▄▄▄▄ ████▓░
  13. ▓█████████████▓▓█▄▄ ▀▀▓▓█████▓░ ▀▀▀ ▄ ▀████▄ ▀██ ████████████ ████▀ ▄███▓
  14. ▀███▓▓▓█████████████▄▄▄ ▀▀███▀ ▄███████▄ ▀▀███▄ ▓ ███▓███▓████ ▓█▀ ▄███▀▀
  15. ▀▀▀ ▀▀▀▓▓███▄▄▄▄▄███████▀▀▀▀▓ ▀▀ ███▓ ▀▀ ████ ▀ ▀▓▓█▄▄
  16. ▀▀▀▀▀▀ ▀▀ ▀██▀ ▀▀▀▀▀
  17. RELEASE NAME....: Lynda.com.Ethical.Hacking.Wireless.Networks-ELOHiM
  18. RELEASE DATE....: 2016-10-26
  19. RELEASE SIZE....: 19x15Mb
  20. FORMAT..........: Bookware
  21. LANGUAGE........: English
  22. URL.............: http://www.lynda.com
  23. Wireless networks are convenient and popular, but poor configuration and
  24. encryption leave them open to attack. Hackers can use Wi-Fi
  25. vulnerabilities to infiltrate your entire network. Security professionals
  26. need to know how to detect, prevent, and counter these kinds of attacks
  27. using the latest tools and techniquesΓÇöthe subject of this course with
  28. cybersecurity expert Malcolm Shore. Malcolm covers everything from
  29. configuring basic security to understanding how hackers extract passwords,
  30. harvest connections at rogue access point, and attack networks via
  31. Bluetooth. He also explains how to select the right antennae for testing
  32. and introduces some sophisticated Windows and Linux tools to scan for
  33. vulnerabilities, including Acrylic, Ekahau, and Wireshark. By the end of
  34. the course, you should be able to shore up your wireless connections and
  35. gain confidence that your local network is safe to use.Note: This course
  36. is part of our test prep series for the Certified Ethical Hacker exam.
  37. Review the complete exam objectives at
  38. https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
  39. Topics include:
  40. * Selecting an antenna
  41. * Configuring security
  42. * Extracting WEP and network passwords
  43. * Testing passwords
  44. * Harvesting connections from rogue access points
  45. * Attacking networks via Bluetooth
  46. * Capturing wireless packets with Acrylic WiFi
  47. * Heat mapping with Ekahau
  48. * Wi-Fi sniffing with Wireshark
  49. * Testing the Internet of Things
  50. Subjects: Security, IT, Linux
  51. Author: Malcolm Shore
  52. Level: Intermediate
  53. Duration: 1h 39m
  54. Released: 10/17/2016