Wireless Network Hacking and Penetration Testing

Tools and Techniques to Secure Your 802.11 and Bluetooth Networks
4.3 (9 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
202 students enrolled
$19
$50
62% off
Take This Course
  • Lectures 82
  • Length 5 hours
  • Skill Level Intermediate Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 3/2015 English

Course Description

In this Professional Guide to Wireless Network Hacking and Penetration Testing training course, you will learn the tools and techniques needed to effectively secure your 802.11 and Bluetooth networks. This course is designed for users that already have basic working knowledge of networking concepts.

You will start by learning the basics of 802.11, such as frequencies, access points, associations, and enterprise networks. From there, Ric will teach you how to secure your wireless network. This video tutorial also covers wireless attack tools and wireless attacks. You will also learn about access point attacks and Bluetooth, such as Bluetooth authentication, BT scanner, and how to protect Bluetooth. Finally, you will cover other wireless communications, such as WiMax, ZigBee, and RFID.

Once you have completed this computer based training course, you will be fully capable of securing your 802.11 and Bluetooth networks using the tools and techniques explained in this course.

What are the requirements?

  • This course is designed for users that already have basic working knowledge of networking concepts.

What am I going to get from this course?

  • You will be able to Authenticate ,enable Access Control and Encrypt your network
  • Learn how to test your networks against various types of attacks
  • Learning more about the various types of attacks most networks face

What is the target audience?

  • Professional Guide to Wireless Network Hacking and Penetration Testing

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction
What We Will Cover
Preview
03:13
System Requirements
Preview
04:39
Legal Issues
Preview
02:38
Penetration Testing
02:31
Section 2: 802.11
802.11 Basics
04:17
Frequencies
06:09
Access Points
03:41
Ad-Hoc Versus Infrastructure Mode
02:39
Wireless Modes - ABGN
04:18
SSID, ESSID And BSSID
04:00
MAC Address
04:29
Associations
02:45
Beaconing And Broadcasting
02:45
Access Point Basics
05:08
Enterprise Networks
03:47
WiFi In Windows
03:20
WiFi In Mac OS
02:41
WiFi In Linux
03:52
Section 3: Securing Your Wireless Network
Authentication
01:26
802.1X
04:01
Radius
03:27
Encryption
03:59
WEP
03:20
WPA
04:07
WPA2
03:40
WPS
03:40
EAP
04:03
Hiding Your Network
03:17
Filtering
03:00
Network Segmentation
04:19
Default Configurations
03:17
Section 4: Wireless Attack Tools
Built-In Tools
04:54
Kali Linux
03:21
Kismet
02:49
Aircrack-Ng
04:02
WiFi Explorer
04:07
Wireshark
05:34
Wireless Attack Toolkit
04:14
NetStumbler
03:03
Ettercap
04:10
Dsniff
04:23
Airpwn
04:03
Aireplay-Ng
02:17
Fern
03:28
WiFi Tap
03:04
Cowpatty
03:41
WiFi-Honey
02:34
Section 5: Wireless Attacks
Using Wireshark
03:06
Capturing Network Packets
04:20
Monitor Mode
03:19
Investigating Packets
04:41
Filtering
04:33
Radio Traffic
05:10
War Driving
02:37
Frame Injection
02:52
RADIUS Replay
02:56
SSL Stripping
03:15
De-Authentication
03:10
Airodump
02:57
Fake Authentication
02:26
Section 6: Access Point Attacks
Replay Attacks
03:09
Cracking WEP - Part 1
02:38
Cracking WEP - Part 2
02:01
Cracking WPA
02:06
Rogue Access Points
03:16
Man In The Middle Attacks
02:15
MAC Changes
04:12
Section 7: Bluetooth
Bluetooth Overview
04:20
Bluetooth Authentication
06:20
Bluetooth Profiles
03:33
Bluesnarfer
03:51
Blueranger
02:51
BT Scanner
03:26
Protecting Bluetooth
03:41
Other Tools
02:44
Section 8: Other Wireless
WiMax
03:40
Near Field Communication
04:54
ZigBee
02:44
RFID
05:40
Section 9: Conclusion
What Have We Covered
02:20
Next Steps
03:42
Conclusion
00:49

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Infinite Skills, High Quality Training

Infinite Skills is a Canadian based company who offer a huge and ever growing range of high quality eLearning solutions that teach using studio quality narrated videos backed-up with practical hands-on examples and comprehensive working files. All courses are created by trained educators and experts in video based education.

The emphasis is on teaching real life skills that are essential for progressing in today's commercial environment.

Ready to start learning?
Take This Course