5.00
(1 Rating)

Wireless Security

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

This wireless security course is designed to make students familiar with the main security requirements, security vulnerabilities, threats, and attacks in wireless networks (WIFI, LTE-4G, 5G), learn the security defense protocols and paradigms for wireless networks, understand wireless physical-layer security (PLS) against eavesdropping, and wireless jamming attacks and their countermeasures, know the main methods of physical-layer authentication, and be aware of some of the open challenges and recommendations in the wireless security domain.

The main objective of this wireless security course is to introduce the students to the field of wireless security and its importance, compare between wired and wireless security, review OSI layers and state their security mechanisms, discuss the security requirements, security vulnerabilities and attacks in wireless networks (WIFI, LTE-4G, 5G), learn the security defense protocols and paradigms for wireless networks, understand wireless physical-layer security against eavesdropping, and learn wireless jamming attacks and their countermeasures, and state some open challenges and recommendations.

This course will discuss a variety of topics including the differences between the wireless network and wired network, wireless technical standards, and current and future applications of wireless technology. The course will also examine the challenges and types of (WS), its vulnerabilities, and security issues. Lastly, the course will discuss securing wireless technology and its future.

Who this course is for:

  1. Undergrad students and recent graduates looking to get a foothold in the wireless security Industry.
  2. Individuals and businesses wanting to reduce security risks and avoid potential financial losses.
  3. Businesses looking to prevent (WS) attacks.
  4. Technical managers and engineers wanting to plan a wireless security strategy.
  5. Technical IT professionals learning about wireless networks and security technologies.
Show More

What Will You Learn?

  • Be aware of the types of wireless networks.
  • Know the benefits, advantages and pitfalls of wireless networks.
  • Determine if wireless security is truly secure.
  • Be aware of the different types of wireless security.
  • Know the different ways to secure wireless technology.
  • Know the future of both wireless technology and its security.
  • Understanding the meaning of wireless security and knowing its importance.
  • Becoming familiar with the security requirements of wireless networks.
  • Becoming familiar with the security vulnerabilities and attacks in wireless
  • networks.
  • Learning the security defense protocols and paradigms for wireless networks
  • Learning wireless physical-layer security techniques against eavesdropping, and
  • wireless jamming attacks and their countermeasures.

Course Content

Wireless Security

  • 01:35
  • Introduction, motivation & main content (syllabus) of the Wireless Security Course
    46:52
  • Comparing wired to wireless to understand their security
    35:55
  • The OSI layers functionalities and protocols in wireless communication networks
    01:01:18
  • Security Requirements in Wireless Networks
    17:57
  • Security attacks at the Physical, MAC, Network, Transport, & Application Layers
    35:07
  • WireShark Introduction Presentation by Yazeed
    20:10
  • How to prevent security attacks at different OSI layers
    38:36
  • 28:37
  • Introduction to physical layer security and its motivation
    20:43
  • A summary review of the WS topics discussed in the previous lectures
    34:53
  • The security methods that exist in current wireless networks
    51:44
  • Multi-factor authentication in wireless communication networks
    32:09
  • 5G Security, Applications, Services, and Main Technologies
    37:07
  • 5G Security landscape
    35:53
  • Security and Privacy in 5G Systems and Networks
    33:45
  • Security issues related to virtualization in 5G Networks
    24:07
  • Wireless physical layer security concept and its main methods
    37:43
  • How cryptography is going against the requirements of future IoT?
    32:15
  • Wireless Security – Jamming Types and DoS Attacks – Lecture 8 Part 1
    32:10
  • Wireless Security – Physical Layer Authentication (PLA) – Lecture 8 by Dr M. Furqan part2
    36:48
  • Wireless Security – Physical Layer Authentication (PLA) – Lecture 8 by Dr M. Furqan part3
    09:01
  • Wireless Security – Physical Layer Authentication (PLA) – Lecture 9 by Dr M. Furqan part1
    28:28
  • Wireless Security – Physical Layer Authentication (PLA) – Lecture 9 by Dr M. Furqan part4
    44:46
  • Physical layer security concept: Wireless security Lecture #10 – part 1
    30:48
  • Physical layer security model and examples: Wireless security Lecture #10 – part 2
    01:14:59
  • Short part of one of the lecture series on Wireless Security Training Course – Lecture 1 Part 2
    05:35
  • WaveFarer Radar Analysis with Diffuse Scattering and Backscatter Through Walls
    49:29
  • Python WiFi DoS (Denial of Service) attack
    17:42
  • New Vulnerabilities in 5G Networks
    43:36
  • Physical-Layer Security: Bounds, Codes and Protocols (João Barros) – Part 1 (SPCodingSchool)
    01:22:49
  • Physical Layer Security: Bounds, Codes and Protocols (João Barros) – Part 2 (SPCodingSchool)
    01:24:32
  • Physical Layer Security in Wireless Networks by Vincent Poorsson
    01:25:58
  • Mathematics Seminar: Physical Layer Security in Wireless Networks | H. Vincent Poor
    01:15:58
  • Realizing Physical Layer Security in Large Wireless Networks using Spectrum Programmability
    12:11
  • Physical Layer Security in Wireless Communication using NI-USRP kits
    02:25
  • jiska: Wireless Physical Layer Security
    47:18
  • GRCon17 – SDR Implementation of Physical Layer Security through Artificial Noise – Kevin Ryland
    29:55
  • Learn Network Attacks Using Wireshark
    10:07
  • “Reconfigurable Distributed MIMO for Physical-layer Security in Mobile Networks”
    01:11:03
  • Physical Layer Security
    05:41
  • Georges Kaddoum – ÉTS Research Chair on Physical Layer Security in Wireless Networks
    03:15
  • Putin Informs Hacking Expert Megyn Kelly That She Has No Idea What She’s Talking About
    04:49
  • Wireless Security Presentation on Kali Linux
    10:22
  • Wireless Security Presentation on Anonymity and TOR
    38:36
  • Creating New Human Senses | David Eagleman | Talks at Google
    50:50
  • Wireless Security Course Final Lecture
    01:02:10

Student Ratings & Reviews

5.0
Total 1 Rating
5
1 Rating
4
0 Rating
3
0 Rating
2
0 Rating
1
0 Rating
M
11 months ago
This is one of the best and very rare courses on the domain of wireless physical layer security.
ResearcherStore

Want to receive push notifications for all major on-site activities?