CompTIA PenTest+: Wireless Attacks

CompTIA PenTest+    |    Intermediate
  • 13 Videos | 1h 9m 41s
  • Includes Assessment
  • Earns a Badge
The goal of a wireless network attack is generally to capture information sent across the network. In this course, you'll learn how to research attack vectors and perform wireless attacks. You'll explore common wireless network attack methods including eavesdropping, data modification, data corruption, relay attacks, spoofing, jamming, on-path, and capture handshakes. You'll then learn about common network attacks such as evil twin, bluejacking, bluesnarfing, radio-frequency identification cloning, amplification attacks, and Wi-Fi protected setup PIN attacks. Lastly, you'll discover how to use aircrack-ng suite and amplified antenna wireless network attack tools. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-002) certification exam.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    differentiate between wireless attack methods
    describe wireless evil twin attacks
    recognize the risks of a captive portal attack
    list characteristics of a wireless bluejacking attack
    describe wireless bluesnarfing attacks
    recognize the steps involved in radio-frequency identification (RFID) cloning
  • describe how to hack Bluetooth Low Energy (BLE) devices
    describe wireless amplification attacks
    describe how Wi-Fi protected setup hacking attacks are performed
    provide an overview of cloning, jamming, and repeating
    provide an overview of wireless attack tools such as aircrack-ng suite and amplified antenna
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 38s
    UP NEXT
  • Playable
    2. 
    Wireless Attack Methods
    7m 31s
  • Locked
    3. 
    Evil Twin Attacks
    7m 30s
  • Locked
    4. 
    Captive Portal Attacks
    5m 54s
  • Locked
    5. 
    Wireless Bluejacking
    5m 13s
  • Locked
    6. 
    Wireless Bluesnarfing
    3m 57s
  • Locked
    7. 
    Radio-frequency Identification Cloning
    4m 37s
  • Locked
    8. 
    Bluetooth Low Energy Attacks
    6m 19s
  • Locked
    9. 
    Wireless Amplification Attacks
    4m 30s
  • Locked
    10. 
    Wi-Fi Protected Setup PIN Attack
    4m 39s
  • Locked
    11. 
    Cloning, Jamming, and Repeating
    5m 14s
  • Locked
    12. 
    Wireless Attack Tools
    6m 25s
  • Locked
    13. 
    Course Summary
    45s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE