Wireless Security
About Course
This wireless security course is designed to make students familiar with the main security requirements, security vulnerabilities, threats, and attacks in wireless networks (WIFI, LTE-4G, 5G), learn the security defense protocols and paradigms for wireless networks, understand wireless physical-layer security (PLS) against eavesdropping, and wireless jamming attacks and their countermeasures, know the main methods of physical-layer authentication, and be aware of some of the open challenges and recommendations in the wireless security domain.
The main objective of this wireless security course is to introduce the students to the field of wireless security and its importance, compare between wired and wireless security, review OSI layers and state their security mechanisms, discuss the security requirements, security vulnerabilities and attacks in wireless networks (WIFI, LTE-4G, 5G), learn the security defense protocols and paradigms for wireless networks, understand wireless physical-layer security against eavesdropping, and learn wireless jamming attacks and their countermeasures, and state some open challenges and recommendations.
This course will discuss a variety of topics including the differences between the wireless network and wired network, wireless technical standards, and current and future applications of wireless technology. The course will also examine the challenges and types of (WS), its vulnerabilities, and security issues. Lastly, the course will discuss securing wireless technology and its future.
Who this course is for:
- Undergrad students and recent graduates looking to get a foothold in the wireless security Industry.
- Individuals and businesses wanting to reduce security risks and avoid potential financial losses.
- Businesses looking to prevent (WS) attacks.
- Technical managers and engineers wanting to plan a wireless security strategy.
- Technical IT professionals learning about wireless networks and security technologies.
Course Content
Wireless Security
-
01:35
-
Introduction, motivation & main content (syllabus) of the Wireless Security Course
46:52 -
Comparing wired to wireless to understand their security
35:55 -
The OSI layers functionalities and protocols in wireless communication networks
01:01:18 -
Security Requirements in Wireless Networks
17:57 -
Security attacks at the Physical, MAC, Network, Transport, & Application Layers
35:07 -
WireShark Introduction Presentation by Yazeed
20:10 -
How to prevent security attacks at different OSI layers
38:36 -
28:37
-
Introduction to physical layer security and its motivation
20:43 -
A summary review of the WS topics discussed in the previous lectures
34:53 -
The security methods that exist in current wireless networks
51:44 -
Multi-factor authentication in wireless communication networks
32:09 -
5G Security, Applications, Services, and Main Technologies
37:07 -
5G Security landscape
35:53 -
Security and Privacy in 5G Systems and Networks
33:45 -
Security issues related to virtualization in 5G Networks
24:07 -
Wireless physical layer security concept and its main methods
37:43 -
How cryptography is going against the requirements of future IoT?
32:15 -
Wireless Security – Jamming Types and DoS Attacks – Lecture 8 Part 1
32:10 -
Wireless Security – Physical Layer Authentication (PLA) – Lecture 8 by Dr M. Furqan part2
36:48 -
Wireless Security – Physical Layer Authentication (PLA) – Lecture 8 by Dr M. Furqan part3
09:01 -
Wireless Security – Physical Layer Authentication (PLA) – Lecture 9 by Dr M. Furqan part1
28:28 -
Wireless Security – Physical Layer Authentication (PLA) – Lecture 9 by Dr M. Furqan part4
44:46 -
Physical layer security concept: Wireless security Lecture #10 – part 1
30:48 -
Physical layer security model and examples: Wireless security Lecture #10 – part 2
01:14:59 -
Short part of one of the lecture series on Wireless Security Training Course – Lecture 1 Part 2
05:35 -
WaveFarer Radar Analysis with Diffuse Scattering and Backscatter Through Walls
49:29 -
Python WiFi DoS (Denial of Service) attack
17:42 -
New Vulnerabilities in 5G Networks
43:36 -
Physical-Layer Security: Bounds, Codes and Protocols (João Barros) – Part 1 (SPCodingSchool)
01:22:49 -
Physical Layer Security: Bounds, Codes and Protocols (João Barros) – Part 2 (SPCodingSchool)
01:24:32 -
Physical Layer Security in Wireless Networks by Vincent Poorsson
01:25:58 -
Mathematics Seminar: Physical Layer Security in Wireless Networks | H. Vincent Poor
01:15:58 -
Realizing Physical Layer Security in Large Wireless Networks using Spectrum Programmability
12:11 -
Physical Layer Security in Wireless Communication using NI-USRP kits
02:25 -
jiska: Wireless Physical Layer Security
47:18 -
GRCon17 – SDR Implementation of Physical Layer Security through Artificial Noise – Kevin Ryland
29:55 -
Learn Network Attacks Using Wireshark
10:07 -
“Reconfigurable Distributed MIMO for Physical-layer Security in Mobile Networks”
01:11:03 -
Physical Layer Security
05:41 -
Georges Kaddoum – ÉTS Research Chair on Physical Layer Security in Wireless Networks
03:15 -
Putin Informs Hacking Expert Megyn Kelly That She Has No Idea What She’s Talking About
04:49 -
Wireless Security Presentation on Kali Linux
10:22 -
Wireless Security Presentation on Anonymity and TOR
38:36 -
Creating New Human Senses | David Eagleman | Talks at Google
50:50 -
Wireless Security Course Final Lecture
01:02:10