Join Uptime to get the key ideas from

COURSE HACK

Ethical Hacking: Wireless Networks Summary

Malcolm Shore

Ethical Hacking: Wireless Networks

by Malcolm Shore

Ethical Hacking: Wireless Networks

Malcolm Shore

Clock Icon5 min
Insight Icon3 key insights
Audio IconVisual, audio & text

In this in-depth course, Professor Malcolm Shore helps us develop the skills we need to test and strengthen wireless networks.

Get the app now

Ethical Hacking: Wireless Networks

by Malcolm Shore

Ethical Hacking: Wireless Networks

Malcolm Shore

Overview

An open WiFi network can be a godsend for people looking to work or check their messages on the go. But how many of us think about security before we connect?

Dr. Malcolm Shore is an experienced cybersecurity expert who spent a decade as the Director of Information Systems Security at New Zealand's Government Communications Security Bureau. Since then, Dr. Shore has been in multiple cybersecurity teaching and consulting roles in universities and the industry.

In this course, the seasoned cybersecurity expert helps us detect, prevent, and counter Wi-Fi-vulnerability-related attacks. The course is part of a test prep series for the Certified Ethical Hacker exam, which prepares students for the exam and helps them pursue a career testing networks to expose and address vulnerabilities.

Download the Uptime app to

Audio iconRead or listen, with different modes
Adjust speed iconAdjust audio speed in the app
Bookmark iconBookmark to save titles for later
Share iconShare your favourite Hacks
Download

Download Uptime to get the key insights and actions from Ethical Hacking: Wireless Networks

Get the app now

Favorite Quote

"The use of a wireless network isn't without its hazards, and ensuring that home and business use of wireless is secure is the job of the wireless network tester."

Malcolm Shore

You may also like

Elon Musk: SpaceX, Mars, and Tesla
Lex Fridman Podcast, Lex Fridman , Elon Musk
Token Economy
Shermin Voshmgir
The Future of Payment Technology
University of Michigan, Andrew Wu, Robert Dittmar
The New Breed
Kate Darling
Where Will Man Take Us?
Atul Jalan
Brian Armstrong: How I Built Coinbase
How I Built This, Guy Raz, Brian Armstrong
Digital Wellbeing
University of York
Common Malware Attacks and Defense Strategies
EC-Council
Whit Gibbs: How Everyone Can Become a Bitcoin Miner
The Pomp Podcast, Anthony Pompliano, Whit Gibbs
Inventing Bitcoin
Yan Pritzker, Nicholas Evans
Introduction to Databases and SQL
National Center for Computing Education, Raspberry Pi Foundation
How To Talk To Robots
Tabitha Goldstaub
NFTs Can Be a 10 Trillion Dollar Business
The Pomp Podcast, Anthony Pompliano, Tom Bilyeu
What Are Cryptocurrency Wallets?
The Zen Crypto Show, Sebastien Couture, ZenGo
Introduction to Web Development
National Center for Computing Education, Raspberry Pi Foundation
2030
Mauro F. Guillen
How to Get Started in Crypto?
The Zen Crypto Show, Sebastien Couture, ZenGo
Deep Web
Alex Winter
A Thousand Brains
Jeff Hawkins, Richard Dawkins
Analytics for Decision Making
Rick Cleary, Nathan Karst, Davit Khachatryan, Babson College
Digital Marketing and Data Driven Analytics
Brenda Aranda, Fernando Sierra Saavedra, Tecnológico de Monterrey
The Age of AI: And Our Human Future
Henry A Kissinger, Eric Schmidt, Daniel Huttenlocher
Introduction to Online and Blended Teaching
Barbara Kurshan, Donna Murdoch, Betty Chandy, University of Pennsylvania
Understanding Computer Systems
National Center for Computing Education, Raspberry Pi Foundation, Mac Bowley
Reality Sets in for NFTs: The Potential Future
Real Vision, Raoul Pal, Alexandre Dreyfus

View the full hack with *uptime

App store iconGoogle play store icon

Ethical Hacking: Wireless Networks

Malcolm Shore

If you buy this course we may receive a small commission for this purchase.

Take this course on LinkedIn Learning
© 2022 Uptime App LtdWe will receive a small commission from all purchases on Amazon