YoVDO

The Black Art of Wireless Post Exploitation

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Wireless Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced wireless post-exploitation techniques in this conference talk from GrrCON 2017. Delve into the intricacies of manipulating wireless networks after initial access has been gained, learning sophisticated methods for maintaining persistence and expanding control. Gain insights into the "black art" of wireless hacking, including stealthy data exfiltration, pivoting through compromised access points, and evading detection in enterprise environments. Discover cutting-edge tools and tactics used by penetration testers and ethical hackers to thoroughly assess wireless infrastructure security. Whether you're a cybersecurity professional or an aspiring ethical hacker, this presentation offers valuable knowledge to enhance your understanding of wireless network vulnerabilities and post-exploitation strategies.

Syllabus

Gig15 The Black Art of Wireless Post Exploitation Gabriel solstice Ryan


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube