Wi-Fi Penetration Testing

IT Security
  • 12 Videos | 56m 29s
  • Includes Assessment
  • Earns a Badge
Likes 15 Likes 15
Explore the business convenience of Wi-Fi access, how to recognize the vulnerabilities of wireless networks, and the importance of Wi-Fi penetration testing in this 12-video course, which examines the categories of threats that can compromise a Wi-Fi network. First, you will examine built-in sniffing capabilities used for penetration testing, and the process for performing a rough access point analysis. This course examines Wi-Fi hotspots, web security, and the vulnerabilities of WEP (wired equivalent privacy). This course demonstrates the process used to exploit a Wi-Fi client's vulnerabilities. You will learn how to use Powerfuzzer, an automated customizable web fuzzer, that is part of Kali Linux vulnerability analysis tools. You will learn how to perform a wireless DoS (denial of service) attack against a wireless network. You will examine bugs using the technique of Wi-Fi fuzzing, and how to exploit WPA with PSK secured Wi-Fi. Finally, you will examine the best practices for turning Wi-Fi penetration testing results into policy, security protocols, and user education programs.  

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    identify the business need to provide Wi-Fi access for internal employees and external partners and recognize the categories of wireless threats that can compromise networks
    recognize the built in sniffing capabilities of Wi-Fi used for penetration testing
    step through the process to perform rough AP analysis
    identify the vulnerabilities and processes used to undermine an unsecured Wi-Fi hotspot
    describe the processes used to undermine a Wi-Fi client's vulnerabilities
  • list the vulnerabilities of WEP security and identify how they can be exploited
    outline the steps used to perform a Denial of Service attack against a wireless network
    describe the technique of Wi-Fi fuzzing as a method to discover bugs over a wireless network
    list the vulnerabilities of WPA pre-shared key security and identify how they can be exploited
    identify best practices for taking Wi-Fi pen testing results and integrating them into security protocols and end-user education programs
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    2m 1s
    UP NEXT
  • Playable
    2. 
    Wi-Fi Convenience and Wi-Fi Threats
    4m 52s
  • Locked
    3. 
    Built-in Wi-Fi Sniffing
    7m
  • Locked
    4. 
    Mapping Access Points
    5m 45s
  • Locked
    5. 
    Exploiting Wi-Fi Hotspots
    3m 45s
  • Locked
    6. 
    Exploiting Wi-Fi Clients
    4m 38s
  • Locked
    7. 
    Exploiting WEP Security
    5m 26s
  • Locked
    8. 
    Executing a Wireless DOS Attack
    4m 21s
  • Locked
    9. 
    Discover Bugs Using Wi-Fi Fuzzing
    2m 55s
  • Locked
    10. 
    Exploiting WPA2 PSK Secured Wi-Fi
    5m 40s
  • Locked
    11. 
    Turning Wi-Fi Pen Test Results into Policy
    3m 32s
  • Locked
    12. 
    Course Summary
    1m 34s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 5 Likes 5  
Likes 0 Likes 0  
Likes 0 Likes 0  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 25 Likes 25  
Likes 58 Likes 58  
Likes 31 Likes 31