Prerequisites: strong system administration experience and some familiarity with security
If you share resources across your network or the cloud, you need a firm grasp of all of the security implications. In this course, you'll get hands-on experience securing your infrastructure while learning about risk assessment and management, sensitive data, computer forensics, penetration testing, and much more. By the end of this course, you'll know how to …
Network and Cloud Security
Video description
Prerequisites: strong system administration experience and some familiarity with security
If you share resources across your network or the cloud, you need a firm grasp of all of the security implications. In this course, you'll get hands-on experience securing your infrastructure while learning about risk assessment and management, sensitive data, computer forensics, penetration testing, and much more. By the end of this course, you'll know how to secure your data and keep it that way.
Creating A Metasploit Module For An Exploit - Part 1
Creating A Metasploit Module For An Exploit - Part 2
Creating A Metasploit Module For An Exploit - Part 3
Exploit Payloads
Shellcode - Part 1
Shellcode - Part 2
Shellcode - Part 3
Shellcode - Part 4
Making Exploits Harder To Detect
Encoding Shellcode - Part 1
Encoding Shellcode - Part 2
Web Exploitation
Web Exploits In Metasploit
ARM Exploitation
Android Exploits In Metasploit
Future Directions
Wrap Up And Suggestions For Further Study
Introduction
Introduction And About The Author
What We Will Cover
System Requirements
Legal Issues
Penetration Testing
802.11
802.11 Basics
Frequencies
Access Points
Ad-Hoc Versus Infrastructure Mode
Wireless Modes - ABGN
SSID, ESSID And BSSID
MAC Address
Associations
Beaconing And Broadcasting
Access Point Basics
Enterprise Networks
WiFi In Windows
WiFi In Mac OS
WiFi In Linux
Securing Your Wireless Network
Authentication
802.1X
Radius
Encryption
WEP
WPA
WPA2
WPS
EAP
Hiding Your Network
Filtering
Network Segmentation
Default Configurations
Wireless Attack Tools
Built-In Tools
Kali Linux
Kismet
Aircrack-Ng
WiFi Explorer
Wireshark
Wireless Attack Toolkit
NetStumbler
Ettercap
Dsniff
Airpwn
Aireplay-Ng
Fern
WiFi Tap
Cowpatty
WiFi-Honey
Wireless Attacks
Using Wireshark
Capturing Network Packets
Monitor Mode
Investigating Packets
Filtering
Radio Traffic
War Driving
Frame Injection
RADIUS Replay
SSL Stripping
De-Authentication
Airodump
Fake Authentication
Access Point Attacks
Replay Attacks
Cracking WEP - Part 1
Cracking WEP - Part 2
Cracking WPA
Rogue Access Points
Man In The Middle Attacks
MAC Changes
Bluetooth
Bluetooth Overview
Bluetooth Authentication
Bluetooth Profiles
Bluesnarfer
Blueranger
BT Scanner
Protecting Bluetooth
Other Tools
Other Wireless
WiMax
Near Field Communication
ZigBee
RFID
Conclusion
What Have We Covered
Next Steps
Conclusion
Start your Free Trial Self paced Go to the Course We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.
This site uses cookies. By continuing to use this website, you agree to their use.I Accept