IT security professionals: Learn how to identify and repair vulnerabilities in your wireless networks. This course is part of our Certified Ethical Hacker test prep series.
- [Malcolm] Wireless networks are now part of life for everyone at home, in business, and in the government. Wireless connectivity has enabled on-the-go access to everything from social media sites to enterprise applications, allows home users to use their laptops in and around the house at will, and offers convenient guest access to businesses. However, the use of a wireless network isn't without its hazards, and ensuring that home and business use of wireless is secure is the job of the wireless network tester. In this course, I'll explain the technology used in wireless networks and the risks it brings, which protocols are vulnerable to attack and the tools available to test for vulnerable services. I'm Malcolm Shore, and I've spent a career helping governments and businesses protect their systems against cyberattacks. When you've finished this course, you'll have a great understanding of how to test for wireless network weaknesses. Now let's get started with wireless testing.
Note: This course is part of our test prep series for the Certified Ethical Hacker exam. Review the complete exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Selecting an antenna
- Configuring security
- Extracting WEP and network passwords
- Testing passwords
- Harvesting connections from rogue access points
- Attacking networks via Bluetooth
- Capturing wireless packets with Acrylic Wi-Fi
- Heat mapping with Ekahau
- Wi-Fi sniffing with Wireshark
- Testing the Internet of Things