IT security professionals: Learn how to identify and repair vulnerabilities in your wireless networks. This course is part of our Certified Ethical Hacker test prep series.
- [Narrator] Wireless networks are now part of life for everyone at home, in business, and in the government. Wireless connectivity has enabled on-the-go access to everything from social media sites to enterprise applications, allows home users to use their laptops in and around the house at will, and offers convenient guest access for businesses. However, the use of a wireless network isn't without it's hazards, and ensuring that home and business use of wireless is secure is the job of the wireless network tester.
Understanding the risks also helps us all make informed judgments about the use of public Wi-Fi hotspots. I'm Malcolm Shore, and I've spent a career helping governments and businesses protect their systems against cyber attacks. In this course I'll explain the technology used in wireless networks, and the risks it brings, which protocols are vulnerable to attack, and the tools available to test for vulnerable services. I'll start by explaining the basics of wireless networking and the various forms of wireless network security.
I'll demonstrate the basic Windows and Linux toolsets for wireless network testing, and cover the issue of rogue access points. When you finish this course, you'll have a great understanding of how to test for wireless network weaknesses. Now let's get started with wireless testing.
Note: This course is part of our test prep series for the Certified Ethical Hacker exam. Review the complete exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Selecting an antenna
- Configuring security
- Extracting WEP and network passwords
- Testing passwords
- Harvesting connections from rogue access points
- Attacking networks via Bluetooth
- Capturing wireless packets with Acrylic WiFi
- Heat mapping with Ekahau
- Wi-Fi sniffing with Wireshark
- Testing the Internet of Things