5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Aspire     Penetration Tester to SecOps Engineer     SecOps Engineer Track 1: Penetration Tester
Explore the business convenience of Wi-Fi access, how to recognize the vulnerabilities of wireless networks, and the importance of Wi-Fi penetration testing in this 12-video course, which examines the categories of threats that can compromise a Wi-Fi network. First, you will examine built-in sniffing capabilities used for penetration testing, and the process for performing a rough access point analysis. This course examines Wi-Fi hotspots, web security, and the vulnerabilities of WEP (wired equivalent privacy). This course demonstrates the process used to exploit a Wi-Fi client's vulnerabilities. You will learn how to use Powerfuzzer, an automated customizable web fuzzer, that is part of Kali Linux vulnerability analysis tools. You will learn how to perform a wireless DoS (denial of service) attack against a wireless network. You will examine bugs using the technique of Wi-Fi fuzzing, and how to exploit WPA with PSK secured Wi-Fi. Finally, you will examine the best practices for turning Wi-Fi penetration testing results into policy, security protocols, and user education programs.
 

Objectives

Wi-Fi Penetration Testing

  • discover the key concepts covered in this course
  • identify the business need to provide Wi-Fi access for internal employees and external partners and recognize the categories of wireless threats that can compromise networks
  • recognize the built in sniffing capabilities of Wi-Fi used for penetration testing
  • step through the process to perform rough AP analysis
  • identify the vulnerabilities and processes used to undermine an unsecured Wi-Fi hotspot
  • describe the processes used to undermine a Wi-Fi client's vulnerabilities
  • list the vulnerabilities of WEP security and identify how they can be exploited
  • outline the steps used to perform a Denial of Service attack against a wireless network
  • describe the technique of Wi-Fi fuzzing as a method to discover bugs over a wireless network
  • list the vulnerabilities of WPA pre-shared key security and identify how they can be exploited
  • identify best practices for taking Wi-Fi pen testing results and integrating them into security protocols and end-user education programs
  • summarize the key concepts covered in this course