LEARNING FOR LIFE

Get Yourself a Better Life! Free eLearning Download

  • Technical
    • Internet & Networking
    • Security & Hacking
    • AI | Artificial intelligence
    • OS & Server
    • WEB/HTML/CSS/AJAX
    • Database & SQL
    • Programming
    • Perl & PHP
    • .Net & Java
    • Mobile Development
    • C/C++/C#
    • Game Development
    • Unix & Linux
    • MAC OS X
    • Windows
    • OFFICE
    • Operation Systems
    • Hardware
  • Graphic & Media
    • Photography
    • 3D
    • Adobe Product Training
    • Art & Drawing & Painting
    • Film & Film Making
    • Game Designing
    • Music Training
    • Tutorials for designer
  • Business
    • Business & Investing
    • Writing & Affiliate
    • Marketing
    • Sales
    • Economics & Finances
    • Seo & Site Traffic
    • Stock & ForEX
  • Life Stype
    • Self Improvement | MP
    • Mindset | NLP
    • Fashion / Clothing / Grooming
    • Seduction
    • Fighting / Martial Arts
    • Food / Drink / Cooking
    • Health / Fitness / Massage
    • Languages / Accents
    • Magic / Illusions / Tricks
    • Psychology / Body Language
  • Engineering & Science
    • Cultures & History
    • Electrical & Architecture
    • Mathematics & Physics
    • Medical
  • Entertainment
    • Comic
    • Manga
    • Novel
    • Magazine
  • PC Game
    • Mac Game
    • Xbox Game
    • Play Station Game
Home » Ebooks & Tutorials » Technical » Security & Hacking » Pluralsight – Implementing Wireless Security in a BYOD Environment

Pluralsight – Implementing Wireless Security in a BYOD Environment

04/03/2015 Learning for Life Leave a Comment

Pluralsight – Implementing Wireless Security in a BYOD Environment
English | Size: 939.64 MB (985,284,310 Bytes)
Category: Tutorial


This course explains Wi-Fi security with a focus on implementing WPA2 to meet the growing demands for BYOD. The course begins with a discussion of common wireless attacks and countermeasures, and then details the different Wi-Fi security mechanisms. It compares and contrasts the different encryption, authentication, and message authentication options to help you select the right security mechanisms for your organization.

This course explains Wi-Fi security with a focus on implementing WPA2 to meet the growing demands for BYOD. The course begins with a discussion on common wireless attacks, demonstrates how you can detect these attacks, and describes the countermeasures you can put in place to protect your network. Rogue access points, DoS, and use of public hotspots are covered.

The course then details the different security mechanisms defined in the 802.11 specifications, starting with the different encryption options, including the risks associated with using WEP and TKIP, and the transition to AES. There is an in-depth look at the different authentication mechanisms, including MAC, 802.1x, and Web-based authentication. The course concludes with a detailed discussion on TKIP and CCMP message authentication, and the new 802.11w mechanism that protects management frames.

Details on the security changes made to support the new 802.11ac very high throughput standard are also covered.

Authored by

Avril Salter

Dr. Salter is a consultant, writer and technical trainer with over 20 years of industry experience in deploying networks and managing IT operations. She has held executive and technical positions at small start-ups and major corporations including IBM, Intel, Microsoft, Motorola, and Sprint. Dr. Salter’s operations experience includes running an enterprise wide IT department for a major corporation with international engineering and manufacturing facilities. She first started to work on wireless LANs in the 90’s, and she taught Cisco engineers about wireless LANs for over 10 years. Dr. Salter has worked extensively in Europe, North America, Asia, and the South Pacific. Dr. Salter received her Ph.D. in engineering from the University of Reading, UK and she holds several industry and vendor certifications.

Buy Long-term Premium Accounts To Support Me & Max Speed

DOWNLOAD:


http://uploaded.net/file/gicitnys/Pluralsight%20-%20Implementing%20Wireless%20Security%20in%20a%20BYOD%20Environment.part1.rar
http://uploaded.net/file/4b3tiaxa/Pluralsight%20-%20Implementing%20Wireless%20Security%20in%20a%20BYOD%20Environment.part2.rar
http://uploaded.net/file/bz5ah5cz/Pluralsight%20-%20Implementing%20Wireless%20Security%20in%20a%20BYOD%20Environment.part3.rar
http://uploaded.net/file/c46dj8eq/Pluralsight%20-%20Implementing%20Wireless%20Security%20in%20a%20BYOD%20Environment.part4.rar
http://uploaded.net/file/7gjqwphc/Pluralsight%20-%20Implementing%20Wireless%20Security%20in%20a%20BYOD%20Environment.part5.rar
http://uploaded.net/file/504ov21x/Pluralsight%20-%20Implementing%20Wireless%20Security%20in%20a%20BYOD%20Environment.part6.rar
http://uploaded.net/file/ecy6sv26/Pluralsight%20-%20Implementing%20Wireless%20Security%20in%20a%20BYOD%20Environment.part7.rar
http://uploaded.net/file/cz4cdnc8/Pluralsight%20-%20Implementing%20Wireless%20Security%20in%20a%20BYOD%20Environment.part8.rar


http://rapidgator.net/file/4b29843cc1e7bc7a53b02c81a2288f0a/Pluralsight_-_Implementing_Wireless_Security_in_a_BYOD_Environment.part1.rar.html
http://rapidgator.net/file/82db62413ca108d1096eae20c77c3e95/Pluralsight_-_Implementing_Wireless_Security_in_a_BYOD_Environment.part2.rar.html
http://rapidgator.net/file/335255889b5b515407cd3b4685d62af7/Pluralsight_-_Implementing_Wireless_Security_in_a_BYOD_Environment.part3.rar.html
http://rapidgator.net/file/361db446a485c8c480a523d18b40793d/Pluralsight_-_Implementing_Wireless_Security_in_a_BYOD_Environment.part4.rar.html
http://rapidgator.net/file/f03285af25e0cd702dc902e5cb4d1cb3/Pluralsight_-_Implementing_Wireless_Security_in_a_BYOD_Environment.part5.rar.html
http://rapidgator.net/file/99badc2bacb40297261ced99dab1f550/Pluralsight_-_Implementing_Wireless_Security_in_a_BYOD_Environment.part6.rar.html
http://rapidgator.net/file/69ca693c79af72cba7a9b8dfbf70c664/Pluralsight_-_Implementing_Wireless_Security_in_a_BYOD_Environment.part7.rar.html
http://rapidgator.net/file/2eecf697aabf757fb53bee16b32bfd5c/Pluralsight_-_Implementing_Wireless_Security_in_a_BYOD_Environment.part8.rar.html

If any links die or problem unrar, send request to http://goo.gl/aUHSZc

Security & Hacking BYOD Environment, Implementing, Pluralsight, Wireless Security

← OSTraining – Introduction to PHP Pluralsight – Introduction to Graph Databases and Neo4j →

About Learning for Life

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Learn and Understand NodeJS (V8, Express, MERN/PERN & more) | Udemy
  • Local LLMs via Ollama & LM Studio – The Practical Guide | Udemy
  • TYPESCRIPT FOR BEGINNERS | Udemy
  • BBC Storyville – White Man Walking (2025)
  • Udemy – Python Programming Build and Deploy Your Own Applications

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

2019 2020 2021 2022 2023 2024 Advanced AWS Azure BBC Beginners BitBook BOOKWARE Certified Cisco Cloud Comic Complete Course Data Design eBook Fundamentals Guide Hybrid iLEARN Introduction JavaScript Learn Learning LinkedIn Linux Lynda Masterclass Microsoft Packt Pluralsight Programming Python Security Skillshare Training Udemy Using XQZT

Copyright © 2025 · Equilibre on Genesis Framework · WordPress · Log in