Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Provider Logo

Ethical Hacking: Wireless Networks

via LinkedIn Learning

Overview

IT security professionals: Learn how to identify and repair vulnerabilities in your wireless networks. This course is part of our Certified Ethical Hacker test prep series.

Wireless networks are convenient and popular, but poor configuration and encryption leave them open to attack. Hackers can use Wi-Fi vulnerabilities to infiltrate your entire network. Security professionals need to know how to detect, prevent, and counter these kinds of attacks using the latest tools and techniques—the subject of this course with cybersecurity expert Malcolm Shore. Malcolm covers everything from configuring basic security to understanding how hackers extract passwords, harvest connections at rogue access point, and attack networks via Bluetooth. He also explains how to select the right antennae for testing and introduces some sophisticated Windows and Linux tools to scan for vulnerabilities, including Acrylic, Ekahau, and Wireshark. By the end of the course, you should be able to shore up your wireless connections and gain confidence that your local network is safe to use.

Note: This course is part of our test prep series for the Certified Ethical Hacker exam. Review the complete exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.

Syllabus

Introduction
  • Ensuring wireless networks are secure
  • What you should know before watching this course
  • Course disclaimer
1. Wi-Fi Networks
  • Understanding wireless networks
  • Selecting an antenna for wireless network testing
  • Configuring security in wireless networks
  • Understanding the Wi-Fi Protected Setup (WPS)
  • Extracting WEP passwords using Wifite
  • Extracting network passwords through WPS
  • Using WiFite and Aircrack-ng to test WPA passwords
  • Using Pixiedust to recover keys
  • A first look at WPA3
  • Understanding Dragonblood
2. Rogue Access Points
  • Harvesting connections with an evil twin
  • Installing the Wi-Fi Pineapple in Windows
  • Harvesting with the Wi-Fi Pineapple
3. Bluetooth
  • Understanding Bluetooth
  • Scanning for Bluetooth devices
  • Legacy attacks using Bluesnarfer
4. Additional Tools
  • Using FernWi-Fi Cracker
  • Discovering networks with inSSIDer
  • Capturing wireless packets with Acrylic Analyzer
  • Heat mapping with Ekehau
  • Wi-Fi sniffing using Wireshark
  • Scanning with Vistumbler
  • Using Commview to scan Wi-Fi networks
5. Internet of Things
  • Testing the Internet of Things
Conclusion
  • Summary

Taught by

Malcolm Shore

Related Courses

Reviews

0.0 rating, based on 0 reviews

Start your review of Ethical Hacking: Wireless Networks

Never stop learning Never Stop Learning!

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free