Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Endpoint & Wireless Security

via Coursera

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
his course covers the host-level and wireless attack surfaces that every security professional must understand and defend. Covering approximately 4 hours of expert instruction across endpoint threats, malware analysis, attack types, system hardening, and wireless network security, learners develop the skills to harden endpoints and protect wireless networks from a broad range of attacks. Learners benefit by understanding how to identify and analyze malware types, apply host-based security controls including antivirus, EDR, and application whitelisting, and implement wireless security protocols including WPA3 and 802.1X/RADIUS authentication. Online labs reinforce endpoint hardening and wireless security configuration tasks. By the end of this course, learners will be able to secure individual systems and wireless infrastructure against modern threats.

Syllabus

  • Endpoint Threats & Malware
    • This chapter covers malware varieties, insecure configurations, mitigation practices, overflow exploits, authentication threats, botnet disruptions, storage redundancy, hardware protection, endpoint monitoring, encryption usage, intrusion detection, RAID setup, macOS enclave concepts, and zero‑day responses.
  • Attack Types & System Hardening
    • This chapter covers malware varieties, insecure configurations, mitigation practices, overflow exploits, authentication threats, botnet disruptions, storage redundancy, hardware protection, endpoint monitoring, encryption usage, intrusion detection, RAID setup, macOS enclave concepts, and zero‑day responses.
  • Endpoint Security Review & Labs
    • This chapter covers malware varieties, insecure configurations, mitigation practices, overflow exploits, authentication threats, botnet disruptions, storage redundancy, hardware protection, endpoint monitoring, encryption usage, intrusion detection, RAID setup, macOS enclave concepts, and zero‑day responses.
  • Wi-Fi Security Fundamentals
    • This chapter examines Wi‑Fi standards, proximity technologies, coverage analysis, hidden network limitations, passphrase attacks, hardening options, deceptive threats, protection methods, and wireless impersonation variations.
  • Wireless Attacks & Hardening
    • This chapter examines Wi‑Fi standards, proximity technologies, coverage analysis, hidden network limitations, passphrase attacks, hardening options, deceptive threats, protection methods, and wireless impersonation variations.
  • Course Assignment

Taught by

Dan LaChance, Lyndon Williams, and Mike Meyers

Reviews

Start your review of Endpoint & Wireless Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.