Wireless Penetration Testing for Ethical Hackers
Course
Online
Description
-
Type
Course
-
Methodology
Online
-
Start date
Different dates available
Your complete guide to hacking WEP, WPA, & WPA2 wireless security and their vulnerabilities!There are many tools available on the market for detecting security loopholes and networking attacks. Selecting the right tools and methods might seem confusing, but this course is designed to help navigate through those choices. This course will demonstrate how to perform wireless penetration attacks against wireless networks and their protocols in order to build strong and robust security systems from the ground up using the most popular tools in the penetration testing community.In this course, you’ll learn some basic wireless theory before learning how to hack each type of wireless security commonly used in today’s networks, including WEP, WPA, and WPA2. Using commonly available open source toolsets, you’ll understand the key components of the wireless penetration testing process, including setting up your own wireless penetration testing lab, conducting wireless network reconnaissance (WLAN discovery), packet sniffing and injection, and client attacks.About the AuthorJason Dion, CISSP No. 349867, is an Adjunct Instructor at Liberty University’s College of Engineering and Computational Science and Anne Arundel Community College’s Department of Computing Technologies with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), Security+, Network+, A+, and Information Technology Infrastructure Library v3. With networking experience dating back to 1992, Jason has been a network engineer, Deputy Director of a Network Operations Center, and an Information Systems Officer for large organizations around the globe.
Facilities
Location
Start date
Start date
About this course
Set up a wireless penetration testing lab environment
Use open source tools to learn about our target network
Penetrate WEP security using Aircrack-ng, Wifite.py, and Nethunter
Brute-force your way into a WPS network
Tackle WPA/WPA2 by de-authenticating connected devices
Troubleshoot some commonly encountered technical hurdles
Reviews
This centre's achievements
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 4 years
Subjects
- Networking
- Information Systems
- Testing
- Networks
- Linux
- Network
- Installation
- Systems
- Technology
- Install
- Network Training
- WiFi training
- Wireless
- Mac
Course programme
- Install Kali Linux in VirtualBox
- Connect your wireless adapter to Kali Linux
- Update Kali Linux to the latest version
- Choosing your NetHunter Device
- Installing NetHunter
- Install Kali Linux in VirtualBox
- Connect your wireless adapter to Kali Linux
- Update Kali Linux to the latest version
- Choosing your NetHunter Device
- Installing NetHunter
- Install Kali Linux in VirtualBox
- Connect your wireless adapter to Kali Linux
- Update Kali Linux to the latest version
- Install Kali Linux in VirtualBox
- Connect your wireless adapter to Kali Linux
- Update Kali Linux to the latest version
- Install Kali Linux in VirtualBox
- Connect your wireless adapter to Kali Linux
- Update Kali Linux to the latest version
- Install Kali Linux in VirtualBox
- Connect your wireless adapter to Kali Linux
- Update Kali Linux to the latest version
- Install Kali Linux in VirtualBox
- Connect your wireless adapter to Kali Linux
- Update Kali Linux to the latest version
- Install Kali Linux in VirtualBox
- Connect your wireless adapter to Kali Linux
- Update Kali Linux to the latest version
- Choosing your NetHunter Device
- Installing NetHunter
- Choosing your NetHunter Device
- Installing NetHunter
- Choosing your NetHunter Device
- Installing NetHunter
- Choosing your NetHunter Device
- Installing NetHunter
- Choosing your NetHunter Device
- Installing NetHunter
- Choosing your NetHunter Device
- Installing NetHunter
- Wireless Networks and types
- Evolution of Wireless Networks
- Wireless Security
- MAC address
- Change your MAC address
- Scan for available networks
- Connect to these networks in Kali
- What is promiscuous mode?
- Put your wireless adapter in this mode
- Find broadcasting networks
- Find hidden networks
- Utilize airodump-ng to monitor networks
- Explore information gathering
- Discover capturing network traffic
- Wireless Networks and types
- Evolution of Wireless Networks
- Wireless Security
- MAC address
- Change your MAC address
- Scan for available networks
- Connect to these networks in Kali
- What is promiscuous mode?
- Put your wireless adapter in this mode
- Find broadcasting networks
- Find hidden networks
- Utilize airodump-ng to monitor networks
- Explore information gathering
- Discover capturing network traffic
- Wireless Networks and types
- Evolution of Wireless Networks
- Wireless Security
- Wireless Networks and types
- Evolution of Wireless Networks
- Wireless Security
- Wireless Networks and types
- Evolution of Wireless Networks
- Wireless Security
- Wireless Networks and types
- Evolution of Wireless Networks
- Wireless Security
- Wireless Networks and types
- Evolution of Wireless Networks
- Wireless Security
- Wireless Networks and types
- Evolution of Wireless Networks
- Wireless Security
- MAC address
- Change your MAC address
- MAC address
- Change your MAC address
- MAC address
- Change your MAC address
- MAC address
- Change your MAC address
- MAC address
- Change your MAC address
- MAC address
- Change your MAC address
- Scan for available networks
- Connect to these networks in Kali
- Scan for available networks
- Connect to these networks in Kali
- Scan for available networks
- Connect to these networks in Kali
- Scan for available networks
- Connect to these networks in Kali
- Scan for available networks
- Connect to these networks in Kali
- Scan for available networks
- Connect to these networks in Kali
Additional information
Wireless Penetration Testing for Ethical Hackers