Course list http://www.c-jump.com/bcc/

Wi-Fi Security


  1. New Wave of Wireless Consumer Products
  2. Smartphone and Wi-Fi
  3. Mobile Wi-Fi Hotspots Bridging Two Wireless Worlds
  4. Low User Awareness
  5. Controlled Environment
  6. Issues with Wi-Fi
  7. Issues with Wi-Fi, cont.
  8. Issues with Wi-Fi, cont.
  9. Smart Phone Vulnerabilities
  10. Smart Phone Vulnerabilities, cont.
  11. Requirements for Network Forensics
  12. Requirements for Network Forensics, cont.
  13. Requirements for Network Forensics, cont.
  14. Wireless: No Choke Point
  15. Wireless: No Choke Point, cont.
  16. Wireless: No Choke Point, cont.
  17. Multi-channel operation
  18. Wireless: Dynamic topology
  19. Wireless: Dynamic topology, cont.
  20. Wireless: Dynamic topology, cont.
  21. Wireless: Dynamic topology, cont.
  22. Wireless: Encrypted Traffic
  23. WPA and WPA2
  24. Wireless Vulnerability Assessment
  25. Wireless Vulnerability Assessment, cont.
  26. Evolution of Wireless Forensics Methods
  27. Evolution of Wireless Forensics Methods, cont.
  28. Evolution of Wireless Forensics Methods, cont.
  29. Capturing Raw Packet Traces
  30. Capturing Raw Packet Traces, cont.
  31. Quantitative Forensics
  32. Quantitative Forensics, cont.
  33. Limitations OF Raw Forensics and Quantitative Forensics
  34. Wireless Anti-Forensic Techniques
  35. Stealth-mode Rogue APs
  36. Malicious clients
  37. Known Vulnerable SSIDs
  38. Mobile Honeypot
  39. Qualitative Wireless Forensics Workflow