Search result for Wireless protocols Online Courses & Certifications
Get Course Alerts by Email
Managing Network Security
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 15 hours to complete
Introduction to Network Protocols TCP/IP and Ethernet Network Protocols Introduction to Network Protocols TCP/IP and Ethernet Network Protocols Wireless and Cloud Networks (Module 3. Wireless and Cloud Networks What is a Wireless Network? Wireless Standards and Protocols Additional Wireless Network Standards and Technologies Wrap up for Wireless and Cloud Networks Wireless Protocols Wireless Standards and Protocols...
Computer Networks Security from Scratch to Advanced
by Mohammad Adly- 3.9
8 hours on-demand video
By the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, and protocols in a step-by-step pace. Section Four: Wireless Networks Lecture 1: Wireless Networks BenefitsLecture 2: Wireless Networks TypesLecture 3: Wireless Networks Protocol (Wi-Fi)Lecture 4: Wireless Networks DevicesLecture 5: Wireless Networks Drawbacks...
$17.99
Peer-to-Peer Protocols and Local Area Networks
by Xiaobo Zhou- 4.7
Approx. 16 hours to complete
In this course, we discuss peer-to-peer protocols and local area networks. We focus on several medium access control protocols and their performance analysis. We further discuss local area network and wireless LAN. Lecture Slides - Peer-to-Peer Protocols and Services Practice Assessment - Peer-to-Peer Protocols Graded Assessment - Peer-to-Peer Protocols Wireless LANs: CSMA-CA...
All about Arduino Wireless and the IoT
by Stephen Borsay- 0.0
6 hours on-demand video
Students will learn how to manipulate each of the wireless libraries, functions, and protocols to meet the requirements of a wireless network. we will cover not only simple wireless over the "air" , Students will also acquire the knowledge needed to use wireless Wifi chips and Ethernet to pass data to the web with, and without, a computer....
$12.99
Network Security - Protocols
by Aspen Olmsted- 0.0
5 Weeks
Learn more fundamentals of network security, including cryptographic algorithms used in networking protocols, TLS/SSL, IPSec Layer 2 Security and Wireless Security. Among the topics covered are cryptographic algorithms used in networking protocols, TLS/SSL, IPSec Layer 2 Security, and Wireless Security. Summarize the existing wireless security protocols and state which protocols should not be used...
$166
Intro to Information Security
by Wenke Lee , Mustaque Ahamad , Catherine Gamboa- 0.0
Approx. 0
) lesson 2 Software security Vulnerabilities and protections Malware Program analysis lesson 3 Practical cryptography Encryption Authentication Hashing Symmetric and asymmetric crypto lesson 4 Networks Wired and wireless networks Protocols Attacks and countermeasures lesson 5 Applications and special topics Databases Web apps Privacy and anonymity Voting Public policy...
Free
Web Connectivity and Security in Embedded Systems
by Juha Plosila , Farhoud Hosseinpour- 4.4
Approx. 12 hours to complete
This includes putting together different components, selecting suitable communication protocols, and utilizing these protocols in your system. Application Layer Protocols Transport Layer Protocols Internet & Link Layer Protocols M2M Connectivity Protocols M2M Connectivity Protocols Connectivity Protocols M2M Communication Protocols M2M Connectivity Protocols (Graded Quiz) Symmetric key Ciphers and Wireless LAN Security...
Related searches
Basic Cellular Networks Operator Course
by Josh Russell- 4.3
2 hours on-demand video
This course covers fundamental principles used in wireless telecommunication including discussions about the history of cellular communications, radio frequency engineering, cell site planning, equipment components, and call processes. The topics discussed in this class are universal to all cell phone protocols and thus are necessary for those studying advanced protocol theory....
$19.99
M2M & IoT Interface Design & Protocols for Embedded Systems
by Bruce Montgomery, PhD, PMP- 0.0
Approx. 9 hours to complete
M2M and IoT Interface Design and Protocols is the third of three classes in the Embedded Interface Design (EID) specialization, an online version of the on-campus EID class taught in graduate embedded systems design. IoT Application Protocols Communications Protocols Low-level Embedded Interface Protocols M2M Wired and Wireless Protocols...
Kali Linux Wireless Penetration Testing - Novice to Pro!
by Packt Publishing- 0.0
11 hours on-demand video
Test your wireless network's security and master the advanced wireless penetration techniques using Kali Linux The first course, Kali Linux 2017 Wireless Penetration Testing for Beginners, covers enhancing your wireless penetration testing skills with Kali Linux 2017. In this course, you will be discussing the different variety of tools and techniques to find hidden wireless networks and Bluetooth devices....
$12.99