Performing tests from the point of view of a skilled attacker is essential to ensure that the wireless networks in your company are secure. This course will teach you advanced techniques with a focus on red teaming attacks.
As attackers shift their techniques to attack not only technology but people, it is imperative that you are as vigilant as ever. In this course, Wireless Network Penetration Testing Advanced Techniques, you'll focus on red teaming attacks so that you can identify the weaknesses in your own wireless networks and stop a potential compromise from ever occurring. First, you'll delve into rogue access points and fake captive portals. Next, you'll learn about man-in-the-middle attacks, which can intercept and modify data in transit. Lastly, you'll explore denial-of-service techniques that attackers use to distract incident response teams. By the end of this course, you'll be able to perform a wireless penetration test using advanced techniques, targeting not only technologies, but also people.
"Ricardo is a Cybersecurity Consultant based in Toronto (Canada). He has 10+ years of IT experience, 6 of them in the IT Security field. His main interests are: SIEM solutions (IBM QRadar), Enterprise Security Risk, Penetration Testing, Security processes/procedures and Network Security.
Hi everyone, my name is Ricardo and welcome to my Wireless Penetration Test course!
I am a cyber security consultant and pentest specialist, and I will be teaching you everything you need to know to perform a wireless penetration testing. But first, I want you to take your phone now and check how many wireless networks you see available around you right now. How many of them do you think are secure? How many of them would you really trust? I bet you will have a different perspective after this course!
We are going to cover every single step of a wireless penetration test engagement, from information gathering to exploitation and reporting. As this is a very hands on course, you will learn how to crack several kinds of wireless networks, from out-dated WEP networks to the latest WPA2 networks. We will also cover the most common misconfigurations that could allow an attacker to hack into your wireless network. You will see how easy it is to crack a wireless password if the network is not securely configured.
By the end of this course you able to perform a wireless penetration test and deliver to your client a meaningful report.
I hope you’ll join me on this journey to learn the most advanced wireless exploitation techniques with the wireless penetration test course, at Pluralsight.