- ▄▄▄ ▄▄▄
- █████▄ ▄▄▄ ▄█████
- ▄▄▄▄ ▀█████ ▄▄█▓█████▄▄ █████ ▄▄▄ ▄▄▄▄
- ▄██████████▄████▓ █████████████ ████ ▄█████ ██████
- ███▓▀▀▀▀█████▓████ █████▀ ▀████▓ ▓███ ▄██▄ █████▓ ▓██████
- ░▓███▄ ▄████ ████ █████▓ ▓█████▓███ ████ ██████▄ ▄██████▓
- ████████████▀ ████ █████ █████████ ████▄██▄███████▄███▀████▓
- ▀███▄ ▄▄▄ ▄████▀ ▓████ █████████ ████████▓███ ▀██▓▀ ████
- ▀███▄████▄█████ ██████ ████▓█████▄▓████ ▀▀ ████ ▀ ████
- ▄████▄ ▀▀████████▓ ███████ ▓▓██▀███▀ ▀██████▄██▄ ███ ████
- █████████ ▀█▓▀ █████▄▄ ░▓███████▄▄▄████▄██▓ ▀████████████ ████
- ██████████▄ ▄▄ ▀▀█████▄▄▓████▀███████▀▄███ ▄▄ ████████████ ▓▄▄▄▄ ████▓░
- ▓█████████████▓▓█▄▄ ▀▀▓▓█████▓░ ▀▀▀ ▄ ▀████▄ ▀██ ████████████ ████▀ ▄███▓
- ▀███▓▓▓█████████████▄▄▄ ▀▀███▀ ▄███████▄ ▀▀███▄ ▓ ███▓███▓████ ▓█▀ ▄███▀▀
- ▀▀▀ ▀▀▀▓▓███▄▄▄▄▄███████▀▀▀▀▓ ▀▀ ███▓ ▀▀ ████ ▀ ▀▓▓█▄▄
- ▀▀▀▀▀▀ ▀▀ ▀██▀ ▀▀▀▀▀
- RELEASE NAME....: Lynda.com.Ethical.Hacking.Wireless.Networks-ELOHiM
- RELEASE DATE....: 2016-10-26
- RELEASE SIZE....: 19x15Mb
- FORMAT..........: Bookware
- LANGUAGE........: English
- URL.............: http://www.lynda.com
- Wireless networks are convenient and popular, but poor configuration and
- encryption leave them open to attack. Hackers can use Wi-Fi
- vulnerabilities to infiltrate your entire network. Security professionals
- need to know how to detect, prevent, and counter these kinds of attacks
- using the latest tools and techniquesΓÇöthe subject of this course with
- cybersecurity expert Malcolm Shore. Malcolm covers everything from
- configuring basic security to understanding how hackers extract passwords,
- harvest connections at rogue access point, and attack networks via
- Bluetooth. He also explains how to select the right antennae for testing
- and introduces some sophisticated Windows and Linux tools to scan for
- vulnerabilities, including Acrylic, Ekahau, and Wireshark. By the end of
- the course, you should be able to shore up your wireless connections and
- gain confidence that your local network is safe to use.Note: This course
- is part of our test prep series for the Certified Ethical Hacker exam.
- Review the complete exam objectives at
- https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Topics include:
- * Selecting an antenna
- * Configuring security
- * Extracting WEP and network passwords
- * Testing passwords
- * Harvesting connections from rogue access points
- * Attacking networks via Bluetooth
- * Capturing wireless packets with Acrylic WiFi
- * Heat mapping with Ekahau
- * Wi-Fi sniffing with Wireshark
- * Testing the Internet of Things
- Subjects: Security, IT, Linux
- Author: Malcolm Shore
- Level: Intermediate
- Duration: 1h 39m
- Released: 10/17/2016