{"id":38013,"date":"2021-07-04T16:53:43","date_gmt":"2021-07-04T13:53:43","guid":{"rendered":"https:\/\/researcherstore.com\/?post_type=courses&p=38013"},"modified":"2023-04-19T14:02:01","modified_gmt":"2023-04-19T11:02:01","slug":"wireless-security","status":"publish","type":"courses","link":"https:\/\/researcherstore.com\/courses\/wireless-security\/","title":{"rendered":"Wireless Security: From Cryptography to PHY Layer Security"},"content":{"rendered":"
This wireless security course is designed to make students familiar with the main security requirements, security vulnerabilities, threats, and attacks in wireless networks (WIFI, LTE-4G, 5G), learn the security defense protocols and paradigms for wireless networks, understand wireless<\/a> physical layer security (PLS) against eavesdropping, and wireless jamming attacks and their countermeasures, know the main methods of physical-layer authentication, and be aware of some of the open challenges and recommendations in the wireless security domain.<\/strong><\/p>\n The main objective of this wireless security course is to introduce the students to the field of wireless security and its importance, compare between wired and wireless security, review OSI layers and state their security mechanisms, discuss the security requirements, security vulnerabilities and attacks in wireless networks (WIFI, LTE-4G, 5G), learn the security defense protocols and paradigms for wireless networks, understand wireless physical-layer security against eavesdropping, and learn wireless jamming attacks and their countermeasures, and state some open challenges and recommendations.<\/strong><\/p>\n This course will discuss a variety of topics including the differences between the wireless network and wired network, wireless technical standards, and current and future applications of wireless technology. The course will also examine the challenges and types of (WS), its vulnerabilities, and security issues. Lastly, the course will discuss securing wireless technology and its future.<\/strong><\/em><\/p>\n Dr. Jehad M. HAMAMREH is a Ph.D. holder<\/strong>\u00a0with more than 15 years of experience in training, coaching, and research<\/strong>.\u00a0He is among the Word\u2019s Top Experts in the field of Wireless Communications, Wireless Security, Physical Layer Security, Data Analytics, Wireless Sensing, Open RAN, 5G, 6G, IoT, ML, and AI. He is a best-seller and an author of more than 100 research papers and an inventor of more than 20 patents<\/strong>.<\/p>\n ===========<\/strong>\u00a0Contributions Portfolio:<\/strong><\/p>\n ===========<\/strong>\u00a0Research Interests:<\/strong><\/p>\n ===========<\/strong>\u00a0Links and Profiles:<\/strong><\/p>\nWhat Will You Learn? <\/strong><\/h4>\n
\n
Who this course<\/a> is for:<\/strong><\/h4>\n
\n
About the course instructor: Dr. Jehad Hamamreh<\/strong><\/h4>\n
\n
\n
\n
\n