5.00(1)

Wireless Security

  • Course level: All Levels

Description

This wireless security course is designed to make students familiar with the main security requirements, security vulnerabilities, threats, and attacks in wireless networks (WIFI, LTE-4G, 5G), learn the security defense protocols and paradigms for wireless networks, understand wireless physical-layer security (PLS) against eavesdropping, and wireless jamming attacks and their countermeasures, know the main methods of physical-layer authentication, and be aware of some of the open challenges and recommendations in the wireless security domain.

The main objective of this wireless security course is to introduce the students to the field of wireless security and its importance, compare between wired and wireless security, review OSI layers and state their security mechanisms, discuss the security requirements, security vulnerabilities and attacks in wireless networks (WIFI, LTE-4G, 5G), learn the security defense protocols and paradigms for wireless networks, understand wireless physical-layer security against eavesdropping, and learn wireless jamming attacks and their countermeasures, and state some open challenges and recommendations.

This course will discuss a variety of topics including the differences between the wireless network and wired network, wireless technical standards, and current and future applications of wireless technology. The course will also examine the challenges and types of (WS), its vulnerabilities, and security issues. Lastly, the course will discuss securing wireless technology and its future.

Who this course is for:

  1. Undergrad students and recent graduates looking to get a foothold in the wireless security Industry.
  2. Individuals and businesses wanting to reduce security risks and avoid potential financial losses.
  3. Businesses looking to prevent (WS) attacks.
  4. Technical managers and engineers wanting to plan a wireless security strategy.
  5. Technical IT professionals learning about wireless networks and security technologies.

What Will I Learn?

  • Be aware of the types of wireless networks.
  • Know the benefits, advantages and pitfalls of wireless networks.
  • Determine if wireless security is truly secure.
  • Be aware of the different types of wireless security.
  • Know the different ways to secure wireless technology.
  • Know the future of both wireless technology and its security.
  • Understanding the meaning of wireless security and knowing its importance.
  • Becoming familiar with the security requirements of wireless networks.
  • Becoming familiar with the security vulnerabilities and attacks in wireless
  • networks.
  • Learning the security defense protocols and paradigms for wireless networks
  • Learning wireless physical-layer security techniques against eavesdropping, and
  • wireless jamming attacks and their countermeasures.

Topics for this course

47 Lessons30h

Wireless Security

Wireless Security1:35
Wireless Security Course Lecture 1 Part 146:52
Wireless Security Course Lecture 1 Part 235:55
Wireless Security Course Lecture 2 Part 11:01:18
Wireless Security Course Lecture 2 Part 217:57
Wireless Security Course Lecture 2 Part 335:07
WireShark Home Work Presentation by Yazeed20:10
Wireless Security Course Lecture 3 part 138:36
Wireless Security Course Lecture 3 part 228:37
Wireless Security Course Lecture 3 part 320:43
Wireless Security Course Lecture 4 part 134:53
Wireless Security Course Lecture 4 part 251:44
Wireless Security Lecture 5 Part 132:09
Wireless Security Lecture 5 Part 237:07
Wireless Security Lecture 5 Part 335:53
Wireless Security Course Lecture 6 Part 133:45
Wireless Security Course Lecture 6 part 224:07
Wireless Security Lecture 7 Part 137:43
Wireless Security Lecture 7 Part 232:15
Wireless Security – Jamming Types and DoS Attacks – Lecture 8 Part 132:10
Wireless Security – Physical Layer Authentication (PLA) – Lecture 8 by Dr M. Furqan part236:48
Wireless Security – Physical Layer Authentication (PLA) – Lecture 8 by Dr M. Furqan part39:01
Wireless Security – Physical Layer Authentication (PLA) – Lecture 9 by Dr M. Furqan part128:28
Wireless Security – Physical Layer Authentication (PLA) – Lecture 9 by Dr M. Furqan part444:46
Physical layer security concept: Wireless security Lecture #10 – part 130:48
Physical layer security model and examples: Wireless security Lecture #10 – part 21:14:59
Short part of one of the lecture series on Wireless Security Training Course – Lecture 1 Part 25:35
WaveFarer Radar Analysis with Diffuse Scattering and Backscatter Through Walls49:29
Python WiFi DoS (Denial of Service) attack17:42
New Vulnerabilities in 5G Networks43:36
Physical-Layer Security: Bounds, Codes and Protocols (João Barros) – Part 1 (SPCodingSchool)1:22:49
Physical Layer Security: Bounds, Codes and Protocols (João Barros) – Part 2 (SPCodingSchool)1:24:32
Physical Layer Security in Wireless Networks by Vincent Poorsson1:25:58
Mathematics Seminar: Physical Layer Security in Wireless Networks | H. Vincent Poor1:15:58
Realizing Physical Layer Security in Large Wireless Networks using Spectrum Programmability12:11
Physical Layer Security in Wireless Communication using NI-USRP kits2:25
jiska: Wireless Physical Layer Security47:18
GRCon17 – SDR Implementation of Physical Layer Security through Artificial Noise – Kevin Ryland29:55
Learn Network Attacks Using Wireshark10:07
“Reconfigurable Distributed MIMO for Physical-layer Security in Mobile Networks”1:11:03
Physical Layer Security5:41
Georges Kaddoum – ÉTS Research Chair on Physical Layer Security in Wireless Networks3:15
Putin Informs Hacking Expert Megyn Kelly That She Has No Idea What She’s Talking About4:49
Wireless Security Presentation on Kali Linux10:22
Wireless Security Presentation on Anonymity and TOR38:36
Creating New Human Senses | David Eagleman | Talks at Google50:50
Wireless Security Course Final Lecture1:02:10

Student Feedback

5.0

Total 1 Ratings

5
1 rating
4
0 rating
3
0 rating
2
0 rating
1
0 rating

This is one of the best and very rare courses on the domain of wireless physical layer security.

35 £

Material Includes

  • Videos
  • Books
  • Slides
  • Links
  • Certificate

Enrolment validity: Lifetime

Requirements

  • Basic knowledge in computer and telecom systems

Target Audience

  • Undergrad students and recent graduates looking to get a foothold in the wireless security Industry.
  • Individuals and businesses wanting to reduce security risks and avoid potential financial losses.
  • Businesses looking to prevent (WS) attacks.
  • Technical managers and engineers wanting to plan a wireless security strategy.
  • Technical IT professionals learning about wireless networks and security technologies.
  • Anyone else looking to deeply understand the new advances in wireless security domain