1 00:00:01,380 --> 00:00:07,800 Welcome to the module focusing on computer network security in this module We'll take a look at wireless 2 00:00:07,800 --> 00:00:13,240 networks and discuss the threats connected with wireless technologies. 3 00:00:13,300 --> 00:00:16,370 First we'll cover the strengths and weaknesses of wireless technologies 4 00:00:19,240 --> 00:00:24,410 then we'll bust some popular myths circulating around the Wi-Fi standard. 5 00:00:24,460 --> 00:00:29,470 We'll try to understand why the popular solutions that secure especially home network infrastructures 6 00:00:29,670 --> 00:00:35,590 and are often implemented for business networks are completely ineffective and at best can actually 7 00:00:35,590 --> 00:00:37,270 lower the security of a network 8 00:00:41,960 --> 00:00:47,830 will also examine authentication methods related to confirming the identity of users in wireless networks. 9 00:00:51,540 --> 00:00:57,060 Next we'll take a look at the technologies that ensure the authenticity integrity and confidentiality 10 00:00:57,060 --> 00:00:59,350 of data transmitted within these networks 11 00:01:02,570 --> 00:01:09,350 finally we'll examine some typical attacks targeting infrastructure wireless networks and clients the 12 00:01:09,550 --> 00:01:14,530 computers connected to a wireless network see you in the training.