Roger Zimmerman
This is a community college series on Wireless security. The playlist URL is https://www.youtube.com/watch?v=ayGaQiwNQaU&list=PLdfBRDjssB2Y7ajMShcQjOKntcnj0jJzS
CTEC130_Summer2025_Welcome
CIS189 Chapter 13 Video 1 Scanning rogue devices and Kali Linux
CIS189 Chapter 13 Video 2 Infrastructure attacks and USB attack
CIS189 Chapter 13 Video 3 Protocol exploits
CIS189 Chapter 13 Video 4 Developer side mobile security
CIS189 Chapter 11 Video 4 iPhone Vulnerabilities
CIS189 Chapter 11 Video 3 iPhone Layered Architecture
CIS189 Chapter 11 Video 2 Android vulnerabilities
CIS189 Chapter 11 Video 1 Android sandboxing
CIS189 Chapter 9 Video 3 Software tools Part 2
CIS189 Chapter 9 Video 4 Hardware tools
CIS189 Chapter 9 Video 2 Software tools Part 1
CIS189 Chapter 9 Video 1 Tool Functions
CIS189 Chapter 8 Video 6 Multiple final topics
CIS189 Chapter 8 Video 5 DHPC and Mobile Device Management
CIS189 Chapter 8 Video 4 EAP types Intrusion detection and Protocol filtering
CIS189 Chapter 8 Video 3 How RADIUS works
CIS189 Chapter 8 Video 2 VPN_Quarantine_Legal issues
CIS189 Chapter 8 Video 1 Distributed or centralized planning
cis189 Chapter 7 Video 5 Wireless security protocols
CIS189 Chapter 7 video 6 Final few concepts
cis189 chapter 7 Video 3 Best practices
cis189 Chapter 7 Video 4 VPN and VLAN topology
CIS189 Chapter 7 Video 2 Coverage options
CIS189 Chapter 7 Video 1 RF Isolation
CIS189_Ch6_6_OSI_TCPIP Layer attacks
CIS189_Ch6_5_Packet Capturing
CIS189_Ch6_4_Bluetooth Attacks
CIS189_Ch6_3_WarDriving_RogueAccessPoints_BluetoothTechnologiesListed
CIS189_Ch6_2_DoS_Place_Power_ Social Engineering