Performing tests from the point of view of a skilled attacker is essential to ensure that the wireless networks in your company are secure. This course will teach you advanced techniques with a focus on red teaming attacks.
As attackers shift their techniques to attack not only technology but people, it is imperative that you are as vigilant as ever. In this course, Wireless Network Penetration Testing Advanced Techniques, you'll focus on red teaming attacks so that you can identify the weaknesses in your own wireless networks and stop a potential compromise from ever occurring. First, you'll delve into rogue access points and fake captive portals. Next, you'll learn about man-in-the-middle attacks, which can intercept and modify data in transit. Lastly, you'll explore denial-of-service techniques that attackers use to distract incident response teams. By the end of this course, you'll be able to perform a wireless penetration test using advanced techniques, targeting not only technologies, but also people.
Ricardo is a Cybersecurity Consultant based in Toronto (Canada). He has 10+ years of IT experience, 6 of them in the IT Security field. His main interests are: SIEM solutions (IBM QRadar), Enterprise Security Risk, Penetration Testing, Security processes/procedures and Network Security.
Course Overview Hi everyone, my name is Ricardo, and welcome to my course, Wireless Network Penetration Testing Advanced Techniques. I am a cyber security consultant, and I'll be showing you some advanced techniques that will step up your wireless penetration testing skills. You may be familiar with the regular wireless penetration testing, where you find insecure protocols, and try to get the passwords. But what if I tell you that you can test not only the technology, but also people? Think about that. Hackers would not spend 30 days trying to break a secure WPA2 password if they can simply lure users to connect to a rogue access point. And that's what differentiates a basic wireless penetration testing to an advanced one. In this course, we are going to cover not only the technical attacks, but also social engineering techniques so you'll be able to perform a penetration test exactly as a malicious attacker would do. This is a very hands on course, if you do demos and attack techniques, then you can refer to this in your own test environment. The course is divided into five modules. In the first one, we will be discussing the difference between normal penetration testing, and advanced penetration testing, which is also known as a red team penetration test. In the second module, we will discuss how to prepare for the tests, and this is what differentiates a script kiddie to a professional pen tester. Remember, being prepared is being professional. The third and fourth modules have a lot of demos, they cover several advanced wireless penetration techniques, such as decrypting WEP and WPA packet captures, creating rogue access points, creating fake captive portals, denial of service attacks, and much more. And in the last module, we will be discussing some pen test best practices, and the main techniques attackers use to cover their traces. By the end of this course, you'll be able to perform wireless penetration testing using advanced techniques, targeting not only the technology, but also people. Remember, the idea of this course is performing an attack exactly as a malicious attacker will do. As this course is an advanced course, before getting started you should be familiar with the Linux operational system, and a basic understanding of wireless networks and wireless vulnerabilities. Also, this course is a continuation of the course, Wireless Networks Penetration Testing, here from Pluralsight, so if you haven't watched it, I do recommend you checking it out. So I hope you join me on this journey to learn advanced techniques of wireless penetration testing, here at Pluralsight.