Introduction and Wireless Penetration Test Process Overview
Identifying and Exploiting Vulnerabilities
Mar 31, 2017
Wireless networks are everywhere but are they really secure? How easy would it be for an attacker to hack into your network? In this course, Wireless Network Penetration Testing, you'll learn about the most common attack techniques against wireless networks. First, you'll explore the wireless penetration test process. Next, you'll discover how to gather information about your target. With the information gathered, you'll learn how to exploit the most common wireless networks technologies, such as: WEP, WPA, WPA2, and WPS. Finally, you'll cover how to propose recommendations and write a proper wireless penetration test report. When you are finished with this course, you'll have the skills and knowledge about both technical and non-technical aspects of a penetration test, and how to perform a full wireless penetration test engagement for your company or your client.
Ricardo is a Cybersecurity Consultant based in Toronto (Canada). He has 10+ years of IT experience, 6 of them in the IT Security field. His main interests are: SIEM solutions (IBM QRadar), Enterprise Security Risk, Penetration Testing, Security processes/procedures and Network Security.
Course Overview Hi everyone. My name is Ricardo, and welcome to my Wireless Penetration Test course. I'm a cybersecurity consultant and a pen test specialist, and I'll be teaching you everything you need to know to perform wireless penetration testing. But first, I want you to take your phone and check how many wireless networks you see available around you right now. How many of them do you think are secure? How many of them would you really trust? I bet you have a very different perspective after this course. We are going to cover every single step of a wireless penetration test engagement from information gathering to exploitation and reporting. As this is a very hands-on course, you'll learn how to crack several kinds of wireless networks from outdated WEP networks to the latest WPA2 networks. We also cover the most common misconfigurations that could allow an attacker to hack into your wireless network. You see how easy it is to crack a wireless password if the network is not securely configured. By the end of this course, you'll be able to perform a wireless penetration test and deliver to your client a meaningful report. I hope you'll join me on this journey to learn the most advanced wireless exploitation techniques with the Wireless Penetration Test course at Pluralsight.