Wireless Penetration Testing for Ethical Hackers

Course

Online

£ 150 VAT inc.

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Your complete guide to hacking WEP, WPA, & WPA2 wireless security and their vulnerabilities!There are many tools available on the market for detecting security loopholes and networking attacks. Selecting the right tools and methods might seem confusing, but this course is designed to help navigate through those choices. This course will demonstrate how to perform wireless penetration attacks against wireless networks and their protocols in order to build strong and robust security systems from the ground up using the most popular tools in the penetration testing community.In this course, you’ll learn some basic wireless theory before learning how to hack each type of wireless security commonly used in today’s networks, including WEP, WPA, and WPA2. Using commonly available open source toolsets, you’ll understand the key components of the wireless penetration testing process, including setting up your own wireless penetration testing lab, conducting wireless network reconnaissance (WLAN discovery), packet sniffing and injection, and client attacks.About the AuthorJason Dion, CISSP No. 349867, is an Adjunct Instructor at Liberty University’s College of Engineering and Computational Science and Anne Arundel Community College’s Department of Computing Technologies with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), Security+, Network+, A+, and Information Technology Infrastructure Library v3. With networking experience dating back to 1992, Jason has been a network engineer, Deputy Director of a Network Operations Center, and an Information Systems Officer for large organizations around the globe.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Set up a wireless penetration testing lab environment
Use open source tools to learn about our target network
Penetrate WEP security using Aircrack-ng, Wifite.py, and Nethunter
Brute-force your way into a WPS network
Tackle WPA/WPA2 by de-authenticating connected devices
Troubleshoot some commonly encountered technical hurdles

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 4 years

Subjects

  • Networking
  • Information Systems
  • Testing
  • Networks
  • Linux
  • Network
  • Installation
  • Systems
  • Technology
  • Install
  • Network Training
  • WiFi training
  • Wireless
  • Mac

Course programme

Installation and Setup 3 lectures 18:22 The Course Overview This video will give you an overview about the course. Installing Kali Linux in VirtualBox In this video, we will learn how to install Kali Linux in a VirtualBox environment and how to connect/setup their wireless adapter to conduct penetration testing.
  • Install Kali Linux in VirtualBox
  • Connect your wireless adapter to Kali Linux
  • Update Kali Linux to the latest version
Installing NetHunter on Android In this video, we will learn how to install and configure NetHunter on a One Plus One Android-based smartphone for use in our penetration tests.
  • Choosing your NetHunter Device
  • Installing NetHunter
Installation and Setup - Quiz Installation and Setup 3 lectures 18:22 The Course Overview This video will give you an overview about the course. Installing Kali Linux in VirtualBox In this video, we will learn how to install Kali Linux in a VirtualBox environment and how to connect/setup their wireless adapter to conduct penetration testing.
  • Install Kali Linux in VirtualBox
  • Connect your wireless adapter to Kali Linux
  • Update Kali Linux to the latest version
Installing NetHunter on Android In this video, we will learn how to install and configure NetHunter on a One Plus One Android-based smartphone for use in our penetration tests.
  • Choosing your NetHunter Device
  • Installing NetHunter
Installation and Setup - Quiz The Course Overview This video will give you an overview about the course. The Course Overview This video will give you an overview about the course. The Course Overview This video will give you an overview about the course. The Course Overview This video will give you an overview about the course. This video will give you an overview about the course. This video will give you an overview about the course. Installing Kali Linux in VirtualBox In this video, we will learn how to install Kali Linux in a VirtualBox environment and how to connect/setup their wireless adapter to conduct penetration testing.
  • Install Kali Linux in VirtualBox
  • Connect your wireless adapter to Kali Linux
  • Update Kali Linux to the latest version
Installing Kali Linux in VirtualBox In this video, we will learn how to install Kali Linux in a VirtualBox environment and how to connect/setup their wireless adapter to conduct penetration testing.
  • Install Kali Linux in VirtualBox
  • Connect your wireless adapter to Kali Linux
  • Update Kali Linux to the latest version
Installing Kali Linux in VirtualBox In this video, we will learn how to install Kali Linux in a VirtualBox environment and how to connect/setup their wireless adapter to conduct penetration testing.
  • Install Kali Linux in VirtualBox
  • Connect your wireless adapter to Kali Linux
  • Update Kali Linux to the latest version
Installing Kali Linux in VirtualBox In this video, we will learn how to install Kali Linux in a VirtualBox environment and how to connect/setup their wireless adapter to conduct penetration testing.
  • Install Kali Linux in VirtualBox
  • Connect your wireless adapter to Kali Linux
  • Update Kali Linux to the latest version
In this video, we will learn how to install Kali Linux in a VirtualBox environment and how to connect/setup their wireless adapter to conduct penetration testing.
  • Install Kali Linux in VirtualBox
  • Connect your wireless adapter to Kali Linux
  • Update Kali Linux to the latest version
In this video, we will learn how to install Kali Linux in a VirtualBox environment and how to connect/setup their wireless adapter to conduct penetration testing.
  • Install Kali Linux in VirtualBox
  • Connect your wireless adapter to Kali Linux
  • Update Kali Linux to the latest version
Installing NetHunter on Android In this video, we will learn how to install and configure NetHunter on a One Plus One Android-based smartphone for use in our penetration tests.
  • Choosing your NetHunter Device
  • Installing NetHunter
Installing NetHunter on Android In this video, we will learn how to install and configure NetHunter on a One Plus One Android-based smartphone for use in our penetration tests.
  • Choosing your NetHunter Device
  • Installing NetHunter
Installing NetHunter on Android In this video, we will learn how to install and configure NetHunter on a One Plus One Android-based smartphone for use in our penetration tests.
  • Choosing your NetHunter Device
  • Installing NetHunter
Installing NetHunter on Android In this video, we will learn how to install and configure NetHunter on a One Plus One Android-based smartphone for use in our penetration tests.
  • Choosing your NetHunter Device
  • Installing NetHunter
In this video, we will learn how to install and configure NetHunter on a One Plus One Android-based smartphone for use in our penetration tests.
  • Choosing your NetHunter Device
  • Installing NetHunter
In this video, we will learn how to install and configure NetHunter on a One Plus One Android-based smartphone for use in our penetration tests.
  • Choosing your NetHunter Device
  • Installing NetHunter
Installation and Setup - Quiz Installation and Setup - Quiz Installation and Setup - Quiz Installation and Setup - Quiz Wifi Concepts and Reconnaissance 6 lectures 39:30 Wireless Networks In this video, a short discussion of the types of wireless networks, their frequencies, and types of security used (WEP, WPA, WPA2, and WPS).
  • Wireless Networks and types
  • Evolution of Wireless Networks
  • Wireless Security
Concealing and Changing Your MAC Address In this video, we will learn the importance of MAC addresses, how to conceal your own MAC address, and how to impersonate other people’s MAC addresses.
  • MAC address
  • Change your MAC address
Scanning the Airwaves Here we are just reviewing basics of seeing what network are around us.
  • Scan for available networks
  • Connect to these networks in Kali
Promiscuous Mode In this video, students will learn about promiscuous mode, and how to turn your wireless adapter into eavesdropping devices.
  • What is promiscuous mode?
  • Put your wireless adapter in this mode
Hunting for Networks In this video, students will learn to use the built-in tools to find previously hidden wireless networks.
  • Find broadcasting networks
  • Find hidden networks
Information Gathering with Airodump-ng In this video, we will use airodump-ng to monitor the wireless networks within range of our Kali Linux machine. We will cover the different types of information that we can gain using airodump-ng and show how we can setup capturing the network traffic from a single wireless network using the tool.
  • Utilize airodump-ng to monitor networks
  • Explore information gathering
  • Discover capturing network traffic
Wifi Concepts and Reconnaissance - Quiz Wifi Concepts and Reconnaissance. 6 lectures 39:30 Wireless Networks In this video, a short discussion of the types of wireless networks, their frequencies, and types of security used (WEP, WPA, WPA2, and WPS).
  • Wireless Networks and types
  • Evolution of Wireless Networks
  • Wireless Security
Concealing and Changing Your MAC Address In this video, we will learn the importance of MAC addresses, how to conceal your own MAC address, and how to impersonate other people’s MAC addresses.
  • MAC address
  • Change your MAC address
Scanning the Airwaves Here we are just reviewing basics of seeing what network are around us.
  • Scan for available networks
  • Connect to these networks in Kali
Promiscuous Mode In this video, students will learn about promiscuous mode, and how to turn your wireless adapter into eavesdropping devices.
  • What is promiscuous mode?
  • Put your wireless adapter in this mode
Hunting for Networks In this video, students will learn to use the built-in tools to find previously hidden wireless networks.
  • Find broadcasting networks
  • Find hidden networks
Information Gathering with Airodump-ng In this video, we will use airodump-ng to monitor the wireless networks within range of our Kali Linux machine. We will cover the different types of information that we can gain using airodump-ng and show how we can setup capturing the network traffic from a single wireless network using the tool.
  • Utilize airodump-ng to monitor networks
  • Explore information gathering
  • Discover capturing network traffic
Wifi Concepts and Reconnaissance - Quiz Wireless Networks In this video, a short discussion of the types of wireless networks, their frequencies, and types of security used (WEP, WPA, WPA2, and WPS).
  • Wireless Networks and types
  • Evolution of Wireless Networks
  • Wireless Security
Wireless Networks In this video, a short discussion of the types of wireless networks, their frequencies, and types of security used (WEP, WPA, WPA2, and WPS).
  • Wireless Networks and types
  • Evolution of Wireless Networks
  • Wireless Security
Wireless Networks In this video, a short discussion of the types of wireless networks, their frequencies, and types of security used (WEP, WPA, WPA2, and WPS).
  • Wireless Networks and types
  • Evolution of Wireless Networks
  • Wireless Security
Wireless Networks In this video, a short discussion of the types of wireless networks, their frequencies, and types of security used (WEP, WPA, WPA2, and WPS).
  • Wireless Networks and types
  • Evolution of Wireless Networks
  • Wireless Security
In this video, a short discussion of the types of wireless networks, their frequencies, and types of security used (WEP, WPA, WPA2, and WPS).
  • Wireless Networks and types
  • Evolution of Wireless Networks
  • Wireless Security
In this video, a short discussion of the types of wireless networks, their frequencies, and types of security used (WEP, WPA, WPA2, and WPS).
  • Wireless Networks and types
  • Evolution of Wireless Networks
  • Wireless Security
Concealing and Changing Your MAC Address In this video, we will learn the importance of MAC addresses, how to conceal your own MAC address, and how to impersonate other people’s MAC addresses.
  • MAC address
  • Change your MAC address
Concealing and Changing Your MAC Address In this video, we will learn the importance of MAC addresses, how to conceal your own MAC address, and how to impersonate other people’s MAC addresses.
  • MAC address
  • Change your MAC address
Concealing and Changing Your MAC Address In this video, we will learn the importance of MAC addresses, how to conceal your own MAC address, and how to impersonate other people’s MAC addresses.
  • MAC address
  • Change your MAC address
Concealing and Changing Your MAC Address In this video, we will learn the importance of MAC addresses, how to conceal your own MAC address, and how to impersonate other people’s MAC addresses.
  • MAC address
  • Change your MAC address
In this video, we will learn the importance of MAC addresses, how to conceal your own MAC address, and how to impersonate other people’s MAC addresses.
  • MAC address
  • Change your MAC address
In this video, we will learn the importance of MAC addresses, how to conceal your own MAC address, and how to impersonate other people’s MAC addresses.
  • MAC address
  • Change your MAC address
Scanning the Airwaves Here we are just reviewing basics of seeing what network are around us.
  • Scan for available networks
  • Connect to these networks in Kali
Scanning the Airwaves Here we are just reviewing basics of seeing what network are around us.
  • Scan for available networks
  • Connect to these networks in Kali
Scanning the Airwaves Here we are just reviewing basics of seeing what network are around us.
  • Scan for available networks
  • Connect to these networks in Kali
Scanning the Airwaves Here we are just reviewing basics of seeing what network are around us.
  • Scan for available networks
  • Connect to these networks in Kali
Here we are just reviewing basics of seeing what network are around us.
  • Scan for available networks
  • Connect to these networks in Kali
Here we are just reviewing basics of seeing what network are around us.
  • Scan for available networks
  • Connect to these networks in Kali
Promiscuous Mode In this video, students will learn about promiscuous mode, and how to turn your wireless adapter into eavesdropping devices Shared Key WEP authentication. In this attack, aireplay-ng collects an ARP packet and retransmits it back to the wireless access point. This causes a chain reaction where the access point repeats the ARP packet with a new IV repeatedly. By collecting all these IV's, we are able to crack...

Additional information

This course is for anyone interested in learning the vulnerabilities in wireless security standards such as WEP, WPA, and WPA2, and anyone who wants to learn how to conduct wireless network hacking as part of a penetration test

Wireless Penetration Testing for Ethical Hackers

£ 150 VAT inc.