Securing Wireless: Presentation Notes
Course 1 - Implementing Wireless Security
Agenda
- Standards Overview
- Considerations for Your Enterprise
- Regulations Compliance
- Data Value
- Public Perception
- Implementing Security
- WEP
- WPA
- WPA2/802.11i
- TKIP/LEAP/PEAP
- MAC filtering
- 802.1x
- Bluetooth
- Detecting Problems
- Rogue AP
- Rogue Client
- Attacks
- Failures
- Links
- Contact
Course 2 - Auditing Wireless Security
Agenda
- Auditing Wireless Security
- Discovery
- Kismet
- Netstumbler
- GPS Mapping
- Types of Attack
- WEP
- WPA
- LEAP
- Deauthentication
- Bluetooth
- Links
- Contact
Kismet
Netstumbler
Void11 DOS
WEP Cracking
WPA Cracking
Bluetooth Snarfing
Auditing Tutorials
LEAP Hack
No comments:
Post a Comment