» » Pluralsight - Implementing Wireless Security in a BYOD Environment
uploaded.to



Information of news
  • Author: Alexandr
  • Date: 7-02-2015, 00:06
7-02-2015, 00:06

Pluralsight - Implementing Wireless Security in a BYOD Environment

Category: Tutorials

Pluralsight - Implementing Wireless Security in a BYOD Environment

Pluralsight - Implementing Wireless Security in a BYOD Environment
English | 5h 03m | AVC (.mp4) 1024x768 15fps | AAC 48KHz 2ch | 949 Mb
Genre: eLearning


This course explains Wi-Fi security with a focus on implementing WPA2 to meet the growing demands for BYOD. The course begins with a discussion on common wireless attacks, demonstrates how you can detect these attacks, and describes the countermeasures you can put in place to protect your network. Rogue access points, DoS, and use of public hotspots are covered. The course then details the different security mechanisms defined in the 802.11 specifications, starting with the different encryption options, including the risks associated with using WEP and TKIP, and the transition to AES. There is an in-depth look at the different authentication mechanisms, including MAC, 802.1x, and Web-based authentication. The course concludes with a detailed discussion on TKIP and CCMP message authentication, and the new 802.11w mechanism that protects management frames. Details on the security changes made to support the new 802.11ac very high throughput standard are also covered.
DOWNLOAD
(Buy premium account for maximum speed and resumming ability)




uploaded


Rapidgator.net

Site BBcode/HTML Code:
Dear visitor, you went to the site as unregistered user.
We recommend you Sign up or Login to website under your name.
Information
Would you like to leave your comment? Please Login to your account to leave comments. Don't have an account? You can create a free account now.

Tag Cloud

archive of news

^
 
free html hit counter