Weaknesses in your network infrastructure will enable a security professional to gain entry to hosts in the resources, eavesdrop on data in transit, and disturb communications. See how these actions can have serious consequences for the organization.
Connecting computing devices together to share files and other resources is certainly an essential part of today's computing landscape; however, the very act of connecting to networks introduces risk to the devices and the data stored on them. In this course, Penetrating Networks for CompTIA PenTest+, you will gain the ability to review all aspects of given network infrastructure to discover any weaknesses during a penetration test. First, you will learn about the similarities that all networks have in common that create different attack surfaces. Next, you will discover how different networking services can create possible entry points into a network or, at the least, the ability to enumerate systems for more data. Finally, you will explore how to look within the realm of wireless technologies whether it's basic WiFi or Bluetooth, or even some of the flaws of WPS. When you are finished with this course, you will have the skills and knowledge to thoroughly test networks and their devices during a penetration testing engagement.
Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.
Course Overview [Autogenerated] Hi, everyone. I'm Ross ________ us. And welcome to my course Sisko Wireless, Basic Operation and Configuration. I'm a network engineer with more than 20 years experience building enterprise networks and teaching people about them. Wireless networks have exploded in popularity since the advent of the smartphone in 2007. Today, an enterprise network is incomplete without a blanket of WiFi coverage in every area, and employees may travel with wireless device throughout the organization's facilities. Understanding basic wireless principles and the infrastructure required to deliver quality wireless coverage is paramount for a network engineer. This course will introduce the key components needed to understand and configure a wireless infrastructure, including understanding 802.11 protocols and radio frequencies. Understanding encryption principles and protocols and knowing the difference between autonomous and lightweight controller based wireless deployments. By the end of this course, you will be able to implement a wireless network with a W. P. A. To pre shared key using a Cisco Wireless land controller before beginning the course. You should be familiar with villains, villain trunk ng interview and routing D h C P and D. M s Hope youll. I hope you'll join me on this journey to learn Cisco Wireless infrastructure with the Cisco Wireless Basic Operation and Configuration course at Plural site.