From the course: Certified Information Systems Auditor (CISA) Cert Prep
Unlock this course with a free trial
Join today to access over 24,700 courses taught by industry experts.
Wireless security
From the course: Certified Information Systems Auditor (CISA) Cert Prep
Wireless security
- [Presenter] Moving right along through our chapter on network security, we come up to wireless security. Now, everybody knows the benefits of having wireless devices, right? More portable, easy to use, I can connect very easily regardless of where I am. The problem is, anytime we are transmitting data across the airwaves, we've got to be very, very concerned about the security vulnerabilities that exist. Now, starting with, if we start talking about Wi-Fi within our network, we've got to think about just some basic considerations just as far as installation goes, and we're going to want to go through and create a site survey and use heat maps and kind of determine, are there areas where we're going to have interference? Are there certain types of material that the signal is not going to easily pass through? We have to think about channel overlaps. That's going to become important, and you probably talked about that in your Network+ class, but we have to make sure that our devices…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
(Locked)
Introduction and privacy principles5m 40s
-
(Locked)
Physical and environmental controls3m 1s
-
(Locked)
Identity and access management5m 21s
-
(Locked)
SOCs and SLAs2m 48s
-
(Locked)
Networking basics11m 34s
-
(Locked)
The OSI and TCP reference models7m 9s
-
(Locked)
OSI Layers 1 and 215m 11s
-
(Locked)
OSI Layers 3–7 and TCP model15m 54s
-
(Locked)
Network devices10m 36s
-
(Locked)
NAT and PAT5m 38s
-
(Locked)
Firewalls10m 38s
-
(Locked)
Additional security devices, part 110m 23s
-
(Locked)
Additional security devices, part 26m 4s
-
(Locked)
Cryptography basics2m 23s
-
(Locked)
Symmetric cryptography9m 1s
-
(Locked)
Asymmetric cryptography18m 13s
-
(Locked)
Hybrid cryptography5m 21s
-
(Locked)
Integrity4m 45s
-
(Locked)
PKI and wrap-up6m 4s
-
(Locked)
Wireless security5m 6s
-
(Locked)
Indicators of attacks, part 114m 9s
-
(Locked)
Indicators of attacks, part 213m 13s
-
(Locked)
Indicators for application attacks7m 15s
-
(Locked)
Cross-site attacks9m 3s
-
(Locked)
Timing attacks6m 6s
-
(Locked)
Memory issues2m 20s
-
(Locked)
Network-based attacks18m 49s
-
(Locked)
Threat actors and vectors8m 17s
-
(Locked)