Wireless Network Penetration Testing
Offered By: Pluralsight
Course Description
Overview
Virtually every company has wireless networks, making for an attractive target to attackers. This course will teach you how to perform a penetration test in wireless networks.
Wireless networks are everywhere but are they really secure? How easy would it be for an attacker to hack into your network? In this course, Wireless Network Penetration Testing, you'll learn about the most common attack techniques against wireless networks. First, you'll explore the wireless penetration test process. Next, you'll discover how to gather information about your target. With the information gathered, you'll learn how to exploit the most common wireless networks technologies, such as: WEP, WPA, WPA2, and WPS. Finally, you'll cover how to propose recommendations and write a proper wireless penetration test report. When you are finished with this course, you'll have the skills and knowledge about both technical and non-technical aspects of a penetration test, and how to perform a full wireless penetration test engagement for your company or your client.
Wireless networks are everywhere but are they really secure? How easy would it be for an attacker to hack into your network? In this course, Wireless Network Penetration Testing, you'll learn about the most common attack techniques against wireless networks. First, you'll explore the wireless penetration test process. Next, you'll discover how to gather information about your target. With the information gathered, you'll learn how to exploit the most common wireless networks technologies, such as: WEP, WPA, WPA2, and WPS. Finally, you'll cover how to propose recommendations and write a proper wireless penetration test report. When you are finished with this course, you'll have the skills and knowledge about both technical and non-technical aspects of a penetration test, and how to perform a full wireless penetration test engagement for your company or your client.
Syllabus
- Course Overview 1min
- Introduction and Wireless Penetration Test Process Overview 10mins
- Information Gathering 15mins
- Identifying and Exploiting Vulnerabilities 34mins
- Reporting 12mins
Taught by
Ricardo Reimao
Related Courses
Español Salamanca A2Universidad de Salamanca via Miríadax Discovering Science: Science Writing
University of Leeds via FutureLearn Создание концепции интерфейса
Moscow Institute of Physics and Technology via Coursera การรู้สารสนเทศ |Infomation Literacy
Nakhon Ratchasima Rajabhat University via ThaiMOOC Procurement Negotiation
Rutgers University via Coursera