|
(W00) Course Instructions |
|
00:00:00 |
Week 1 |
|
(W18M00) Wireless Security Attacks - Introduction Video |
|
00:00:00 |
|
(W18M01) Wireless Networking Basics and Terminology |
|
00:00:00 |
|
(W18M02) 802.11 Signal Coverage and Channel Usage |
|
00:00:00 |
|
(W18M03) 802.11 Security Protocols |
|
00:00:00 |
|
(W18M04) Lab Hardware Setup |
|
00:00:00 |
|
(W18M05) Lab Software Setup and Configuration |
|
00:00:00 |
|
(W18M06) Week 1, Challenge 1 - MAC Filtering Bypass |
|
00:00:00 |
|
(W18A01) MAC Filtering Bypass and Traffic Capture |
30, 00:00 |
Week 2 |
|
(W18M07) Wireless IV Weaknesses and Decloaking |
|
00:00:00 |
|
(W18M08) Week 2, Challenge 1: Non-Broadcasting SSID |
|
00:00:00 |
|
(W18A02) Non-Broadcasting SSID, Decloaking using Wireshark, Decloaking using Airodump-ng |
30, 00:00 |
|
(W18M09) Week 2, Challenge 2: WEP Attacks |
|
00:00:00 |
|
(W18A03) WEP Attacks, Passive IV Capture |
30, 00:00 |
Week 3 |
|
(W18M10) WPA Handshake and WPS Weaknesses |
|
00:00:00 |
|
(W18M11) Week 3, Challenge 1: WPA Attack |
|
00:00:00 |
|
(W18A04) WPA Attack |
30, 00:00 |
|
(W18M12) Week 3, Challenge 2: WPS Attack |
|
00:00:00 |
|
(W18A05) WPS Attack |
30, 00:00 |
Week 4 |
|
(W18M13) Automated Attack Tools |
|
00:00:00 |
|
(W18M14) Week 4, Challenge 1: WPA2 Attack |
|
00:00:00 |
|
(W18A06) WPA2 Attack |
30, 00:00 |
|
(W18M15) Week 4, Challenge 2: Automated Attack Tools |
|
00:00:00 |
|
(W18A07) Automated Attack Tools |
30, 00:00 |
Bonus |
|
(W18M16) Bonus: Workshop eBook download |
|
00:00:00 |