Wi-Fi Penetration Testing

IT Security    |    Intermediate
  • 12 videos | 51m 29s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 21 users Rating 4.5 of 21 users (21)
Explore the business convenience of Wi-Fi access, how to recognize the vulnerabilities of wireless networks, and the importance of Wi-Fi penetration testing in this 12-video course, which examines the categories of threats that can compromise a Wi-Fi network. First, you will examine built-in sniffing capabilities used for penetration testing, and the process for performing a rough access point analysis. This course examines Wi-Fi hotspots, web security, and the vulnerabilities of WEP (wired equivalent privacy). This course demonstrates the process used to exploit a Wi-Fi client's vulnerabilities. You will learn how to use Powerfuzzer, an automated customizable web fuzzer, that is part of Kali Linux vulnerability analysis tools. You will learn how to perform a wireless DoS (denial of service) attack against a wireless network. You will examine bugs using the technique of Wi-Fi fuzzing, and how to exploit WPA with PSK secured Wi-Fi. Finally, you will examine the best practices for turning Wi-Fi penetration testing results into policy, security protocols, and user education programs.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify the business need to provide wi-fi access for internal employees and external partners and recognize the categories of wireless threats that can compromise networks
    Recognize the built in sniffing capabilities of wi-fi used for penetration testing
    Step through the process to perform rough ap analysis
    Identify the vulnerabilities and processes used to undermine an unsecured wi-fi hotspot
    Describe the processes used to undermine a wi-fi client's vulnerabilities
  • List the vulnerabilities of wep security and identify how they can be exploited
    Outline the steps used to perform a denial of service attack against a wireless network
    Describe the technique of wi-fi fuzzing as a method to discover bugs over a wireless network
    List the vulnerabilities of wpa pre-shared key security and identify how they can be exploited
    Identify best practices for taking wi-fi pen testing results and integrating them into security protocols and end-user education programs
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 1s
  • 4m 52s
    Learn how to identify the business need to provide Wi-Fi access for internal employees and external partners and recognize the categories of wireless threats that can compromise networks. FREE ACCESS
  • Locked
    3.  Built-in Wi-Fi Sniffing
    7m
    Upon completion of this video, you will be able to recognize the built-in sniffing capabilities of Wi-Fi used for penetration testing. FREE ACCESS
  • Locked
    4.  Mapping Access Points
    5m 45s
    In this video, find out how to step through the process to perform a rough AP analysis. FREE ACCESS
  • Locked
    5.  Exploiting Wi-Fi Hotspots
    3m 45s
    Learn how to identify the vulnerabilities and processes used to undermine an unsecured Wi-Fi hotspot. FREE ACCESS
  • Locked
    6.  Exploiting Wi-Fi Clients
    4m 38s
    After completing this video, you will be able to describe the processes used to exploit a Wi-Fi client's vulnerabilities. FREE ACCESS
  • Locked
    7.  Exploiting WEP Security
    5m 26s
    After completing this video, you will be able to list the vulnerabilities of WEP security and identify how to exploit them. FREE ACCESS
  • Locked
    8.  Executing a Wireless DOS Attack
    4m 21s
    In this video, find out how to outline the steps used to perform a Denial of Service attack against a wireless network. FREE ACCESS
  • Locked
    9.  Discover Bugs Using Wi-Fi Fuzzing
    2m 55s
    Upon completion of this video, you will be able to describe the technique of Wi-Fi fuzzing as a method for discovering bugs over a wireless network. FREE ACCESS
  • Locked
    10.  Exploiting WPA2 PSK Secured Wi-Fi
    5m 40s
    Upon completion of this video, you will be able to list the vulnerabilities of WPA pre-shared key security and identify how to exploit them. FREE ACCESS
  • Locked
    11.  Turning Wi-Fi Pen Test Results into Policy
    3m 32s
    In this video, learn how to identify best practices for taking Wi-Fi pen testing results and integrating them into security protocols and end-user education programs. FREE ACCESS
  • Locked
    12.  Course Summary
    1m 34s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 58 users Rating 4.4 of 58 users (58)
Rating 4.8 of 20 users Rating 4.8 of 20 users (20)
Rating 4.6 of 54 users Rating 4.6 of 54 users (54)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.3 of 7 users Rating 4.3 of 7 users (7)
Rating 4.4 of 22 users Rating 4.4 of 22 users (22)
Rating 4.6 of 56 users Rating 4.6 of 56 users (56)