Course list
http://www.c-jump.com/bcc/
Wi-Fi Security
- New Wave of Wireless Consumer Products
- Smartphone and Wi-Fi
- Mobile Wi-Fi Hotspots Bridging Two Wireless Worlds
- Low User Awareness
- Controlled Environment
- Issues with Wi-Fi
- Issues with Wi-Fi, cont.
- Issues with Wi-Fi, cont.
- Smart Phone Vulnerabilities
- Smart Phone Vulnerabilities, cont.
- Requirements for Network Forensics
- Requirements for Network Forensics, cont.
- Requirements for Network Forensics, cont.
- Wireless: No Choke Point
- Wireless: No Choke Point, cont.
- Wireless: No Choke Point, cont.
- Multi-channel operation
- Wireless: Dynamic topology
- Wireless: Dynamic topology, cont.
- Wireless: Dynamic topology, cont.
- Wireless: Dynamic topology, cont.
- Wireless: Encrypted Traffic
- WPA and WPA2
- Wireless Vulnerability Assessment
- Wireless Vulnerability Assessment, cont.
- Evolution of Wireless Forensics Methods
- Evolution of Wireless Forensics Methods, cont.
- Evolution of Wireless Forensics Methods, cont.
- Capturing Raw Packet Traces
- Capturing Raw Packet Traces, cont.
- Quantitative Forensics
- Quantitative Forensics, cont.
- Limitations OF Raw Forensics and Quantitative Forensics
- Wireless Anti-Forensic Techniques
- Stealth-mode Rogue APs
- Malicious clients
- Known Vulnerable SSIDs
- Mobile Honeypot
- Qualitative Wireless Forensics Workflow