Cryptographic & Wireless Attacks

  • 15 Videos | 44m 18s
  • Includes Assessment
  • Earns a Badge
Likes 116 Likes 116
Finding weaknesses in cryptosystems is not simply an exercise for cryptanalysts but also a goal of hackers. Explore cryptographic and wireless attacks such as downgrade and replay attacks, jamming, Bluejacking, and more.

WHAT YOU WILL LEARN

  • recognize brute-force and dictionary attacks
    demonstrate brute-force tools
    describe birthday, known plaintext, and cipher attacks
    compare online vs. offline attacks
    define collisions
    describe downgrade attacks
    recognize replay attacks
    specify initialization vector weaknesses
  • compare evil twins and rogue apps
    describe jamming
    compare bluejacking and bluesnarfing
    define WPS attacks
    recognize disassociation attacks
    compare RFID and near field communication (NFC)
    recognize cryptographic and wireless attacks

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 463 Likes 463  
Likes 148 Likes 148  
Likes 76 Likes 76