Wi-Fi Penetration Testing
IT Security
| Intermediate
- 12 videos | 51m 29s
- Includes Assessment
- Earns a Badge
Explore the business convenience of Wi-Fi access, how to recognize the vulnerabilities of wireless networks, and the importance of Wi-Fi penetration testing in this 12-video course, which examines the categories of threats that can compromise a Wi-Fi network. First, you will examine built-in sniffing capabilities used for penetration testing, and the process for performing a rough access point analysis. This course examines Wi-Fi hotspots, web security, and the vulnerabilities of WEP (wired equivalent privacy). This course demonstrates the process used to exploit a Wi-Fi client's vulnerabilities. You will learn how to use Powerfuzzer, an automated customizable web fuzzer, that is part of Kali Linux vulnerability analysis tools. You will learn how to perform a wireless DoS (denial of service) attack against a wireless network. You will examine bugs using the technique of Wi-Fi fuzzing, and how to exploit WPA with PSK secured Wi-Fi. Finally, you will examine the best practices for turning Wi-Fi penetration testing results into policy, security protocols, and user education programs.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseIdentify the business need to provide wi-fi access for internal employees and external partners and recognize the categories of wireless threats that can compromise networksRecognize the built in sniffing capabilities of wi-fi used for penetration testingStep through the process to perform rough ap analysisIdentify the vulnerabilities and processes used to undermine an unsecured wi-fi hotspotDescribe the processes used to undermine a wi-fi client's vulnerabilities
-
List the vulnerabilities of wep security and identify how they can be exploitedOutline the steps used to perform a denial of service attack against a wireless networkDescribe the technique of wi-fi fuzzing as a method to discover bugs over a wireless networkList the vulnerabilities of wpa pre-shared key security and identify how they can be exploitedIdentify best practices for taking wi-fi pen testing results and integrating them into security protocols and end-user education programsSummarize the key concepts covered in this course
IN THIS COURSE
-
2m 1s
-
4m 52sLearn how to identify the business need to provide Wi-Fi access for internal employees and external partners and recognize the categories of wireless threats that can compromise networks. FREE ACCESS
-
7mUpon completion of this video, you will be able to recognize the built-in sniffing capabilities of Wi-Fi used for penetration testing. FREE ACCESS
-
5m 45sIn this video, find out how to step through the process to perform a rough AP analysis. FREE ACCESS
-
3m 45sLearn how to identify the vulnerabilities and processes used to undermine an unsecured Wi-Fi hotspot. FREE ACCESS
-
4m 38sAfter completing this video, you will be able to describe the processes used to exploit a Wi-Fi client's vulnerabilities. FREE ACCESS
-
5m 26sAfter completing this video, you will be able to list the vulnerabilities of WEP security and identify how to exploit them. FREE ACCESS
-
4m 21sIn this video, find out how to outline the steps used to perform a Denial of Service attack against a wireless network. FREE ACCESS
-
2m 55sUpon completion of this video, you will be able to describe the technique of Wi-Fi fuzzing as a method for discovering bugs over a wireless network. FREE ACCESS
-
5m 40sUpon completion of this video, you will be able to list the vulnerabilities of WPA pre-shared key security and identify how to exploit them. FREE ACCESS
-
3m 32sIn this video, learn how to identify best practices for taking Wi-Fi pen testing results and integrating them into security protocols and end-user education programs. FREE ACCESS
-
1m 34s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.