CompTIA PenTest+: Wireless Attacks

CompTIA    |    Intermediate
  • 13 videos | 1h 4m 11s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 15 users Rating 4.3 of 15 users (15)
The goal of a wireless network attack is generally to capture information sent across the network. In this course, you'll learn how to research attack vectors and perform wireless attacks. You'll explore common wireless network attack methods including eavesdropping, data modification, data corruption, relay attacks, spoofing, jamming, on-path, and capture handshakes. You'll then learn about common network attacks such as evil twin, bluejacking, bluesnarfing, radio-frequency identification cloning, amplification attacks, and Wi-Fi protected setup PIN attacks. Lastly, you'll discover how to use aircrack-ng suite and amplified antenna wireless network attack tools. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-002) certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Differentiate between wireless attack methods
    Describe wireless evil twin attacks
    Recognize the risks of a captive portal attack
    List characteristics of a wireless bluejacking attack
    Describe wireless bluesnarfing attacks
    Recognize the steps involved in radio-frequency identification (rfid) cloning
  • Describe how to hack bluetooth low energy (ble) devices
    Describe wireless amplification attacks
    Describe how wi-fi protected setup hacking attacks are performed
    Provide an overview of cloning, jamming, and repeating
    Provide an overview of wireless attack tools such as aircrack-ng suite and amplified antenna
    Summarize the key concepts covered in this course

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 20 users Rating 4.8 of 20 users (20)
Rating 4.6 of 65 users Rating 4.6 of 65 users (65)
Rating 4.6 of 38 users Rating 4.6 of 38 users (38)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 15 users Rating 4.7 of 15 users (15)
Rating 4.8 of 27 users Rating 4.8 of 27 users (27)
Rating 4.6 of 65 users Rating 4.6 of 65 users (65)