Course info
Mar 12, 2018
1h 38m

Pluralsight is not an official partner or accredited training center of EC-Council. There are various VPN, Wi-Fi, and Bluetooth configurations, some of which are more secure than others. In this course, VPNs and Wireless Networks, you'll gain the ability to configure these technologies while minimizing security risks. First, you'll learn about VPN types, configurations, and best practices. Next, you'll discover how to maximize Wi-Fi network usage and performance. Finally, you'll explore Wi-Fi and Bluetooth threats with hands-on experience cracking a WPA2 passphrase using a dictionary attack. When you're finished with this course, you'll have the skills and knowledge of various wireless networks needed to maximize your security.

About the author
About the author

Daniel Lachance, CompTIA Security+™, CompTIA A+®, CompTIA Network+®, CompTIA Server+, CompTIA Cloud Essentials, MCITP, MCTS, MCSA, is the owner of Lachance IT Consulting Inc. He is the author of the CompTIA Server+ Certification All-in-One Exam Guide, CompTIA Cloud Essentials Certification Study Guide, and co-author of CompTIA Security+ Certification Practice Exams.

More from the author
Computer Fundamentals: Hardware
2h 42m
Jan 14, 2019
More courses by Daniel Lachance
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
HI everyone, I'm Dan Lachance, and welcome to my course, VPNs and Wireless Networks. Both of these technologies are convenient, and they're widely used, but they do come with risks. The key is securing their configuration and use so that we can manage these VPN and wireless risks. Some of the major topics that we're going to cover include the configuration of L2TP/IPsec and SSL VPNs. We'll also identify wireless network vulnerability and mitigations, we'll talk about how to scan for Bluetooth devices, and we'll see how we can crack a Wi-Fi WPA2 network using a dictionary attack. By the end of this course, you'll understand how to configure and secure VPNs and wireless networks in accordance with organizational security requirements. I hope you'll join me to learn about VPNs and wireless networks here at Pluralsight.

Securing Virtual Private Networks
Hi, I'm Dan Lachance. Welcome to VPNs and Wireless Networks. Our focus is first going to be on securing virtual private networks. Virtual private networks, or VPNs, have been used for a long time to allow a connection to a remote private network over a public network such as the internet. We'll start with VPN concepts, which will lead us into looking at different types of VPNs that might suit a specific situation. We'll then focus on VPN encryption and security protocols. We'll talk about some best practices in securing your VPN implementation. And finally, we'll end this section by looking at how to deploy a variety of VPN types, including on-premises and cloud-based VPNs.

Maximizing Wi-Fi Efficiency
There are a number of components that need to work together properly to result in a Wi-Fi network. Let's talk about how to maximize Wi-Fi network efficiency. Specifically, we're going to start by talking about wireless network components. That includes things like wireless network cards, whether we're referring to Wi-Fi or Bluetooth, things like wireless access points, antennas, and so on, after which we'll then focus on how to put all those things together in terms of placement. We'll talk about wireless topologies. For example, in the case of a Wi-Fi network, the placement of the wireless access point and the type of antenna in use can have a great impact on the range and the power of the wireless signal.

Implement Wireless Security
Wi-Fi and Bluetooth wireless networking are very convenient, and they're not going away, and so as network security technicians we need to take it upon ourselves to implement wireless security mechanisms to protect these types of networks. In this module, you'll first learn about general Wi-Fi threats, really a melting pot of a variety of things to be aware of when securing your wireless network environment. Then we'll get more detailed, and on the Wi-Fi side we'll talk about flaws with the implementations of WEP, the Wired Equivalent Privacy, as well as WPA, Wi-Fi Protected Access. We'll also identify a recent Bluetooth threat that is rampant out on the internet. Then we'll discuss Wi-Fi vulnerability mitigation so that you have a sense of what can be done on your part to reduce exposure or reduce the attack surface of your wireless networks. We'll then talk about how you can use Wi-Fi tools to make sure that your network is as secure as it potentially could be. We'll also see some demos where we'll see how easy it is to scan the vicinity for Bluetooth devices, and we'll see how it's possible to crack a Wi-Fi WPA2 wireless network password using a dictionary attack.