Communications and Network Security Part 8 – Wireless Networks



Communications and Network Security Part 8 – Wireless Networks

Communications and Network Security Part 8 - Wireless Networks

Please review the Table of Contents. In this lesson, I describe wireless networking technologies and related safeguards. In addition to encryption, I explore other steps an organization can take to protect information passing through the air.

Table of Contents:
00:42 – IEEE 802.11 Wireless Standards
02:42 – Man-in-the-Middle Attack
03:15 – Wireless Access Methods
03:50 – WEP and WPA
06:15 – WPA2
06:36 – WPA2 Personal (WPA-PSK)
07:34 – WPA2- and WPA3-Enterprise
09:12 – Transition to WPA3
10:01 – EAP Authentication Framework
12:18 – EAP Variations (TLS, TTLS, LEAP, and PEAP)
14:14 – Wireless Network Implementation
14:54 – Site Survey
16:38 – Placement of Access Points
17:29 – Antenna Types
18:03 – Wireless Deployment Modes
18:26 – Infrastructure Deployment Mode
19:13 – SSID Types and Hiding
20:23 – Captive Portals
21:02 – MAC Filtering
22:02 – Attacks Against Wireless Networks
22:55 – War Driving