Wi-Fi Penetration Testing
IT Security
| Intermediate
- 12 Videos | 51m 29s
- Includes Assessment
- Earns a Badge
Explore the business convenience of Wi-Fi access, how to recognize the vulnerabilities of wireless networks, and the importance of Wi-Fi penetration testing in this 12-video course, which examines the categories of threats that can compromise a Wi-Fi network. First, you will examine built-in sniffing capabilities used for penetration testing, and the process for performing a rough access point analysis. This course examines Wi-Fi hotspots, web security, and the vulnerabilities of WEP (wired equivalent privacy). This course demonstrates the process used to exploit a Wi-Fi client's vulnerabilities. You will learn how to use Powerfuzzer, an automated customizable web fuzzer, that is part of Kali Linux vulnerability analysis tools. You will learn how to perform a wireless DoS (denial of service) attack against a wireless network. You will examine bugs using the technique of Wi-Fi fuzzing, and how to exploit WPA with PSK secured Wi-Fi. Finally, you will examine the best practices for turning Wi-Fi penetration testing results into policy, security protocols, and user education programs.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courseidentify the business need to provide Wi-Fi access for internal employees and external partners and recognize the categories of wireless threats that can compromise networksrecognize the built in sniffing capabilities of Wi-Fi used for penetration testingstep through the process to perform rough AP analysisidentify the vulnerabilities and processes used to undermine an unsecured Wi-Fi hotspotdescribe the processes used to undermine a Wi-Fi client's vulnerabilities
-
list the vulnerabilities of WEP security and identify how they can be exploitedoutline the steps used to perform a Denial of Service attack against a wireless networkdescribe the technique of Wi-Fi fuzzing as a method to discover bugs over a wireless networklist the vulnerabilities of WPA pre-shared key security and identify how they can be exploitedidentify best practices for taking Wi-Fi pen testing results and integrating them into security protocols and end-user education programssummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview2m 1sUP NEXT
-
2.Wi-Fi Convenience and Wi-Fi Threats4m 52s
-
3.Built-in Wi-Fi Sniffing7m
-
4.Mapping Access Points5m 45s
-
5.Exploiting Wi-Fi Hotspots3m 45s
-
6.Exploiting Wi-Fi Clients4m 38s
-
7.Exploiting WEP Security5m 26s
-
8.Executing a Wireless DOS Attack4m 21s
-
9.Discover Bugs Using Wi-Fi Fuzzing2m 55s
-
10.Exploiting WPA2 PSK Secured Wi-Fi5m 40s
-
11.Turning Wi-Fi Pen Test Results into Policy3m 32s
-
12.Course Summary1m 34s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.