SANS SEC617: Wireless Penetration Testing and Ethical Hacking (PDF-VID-MP3)

1,700.00

SEC617 will give you the skills you need to understand the security strengths and weaknesses in wireless systems. In this course, you will learn how to evaluate the ever-present cacophony of Wi-Fi networks and identify the Wi-Fi access points and client devices that threaten your organization; assess, attack, and exploit deficiencies in modern Wi-Fi deployments using WPA2 technology, including sophisticated WPA2-Enterprise networks; use your understanding of the many weaknesses in Wi-Fi protocols and apply it to modern wireless systems; and identify and attack Wi-Fi access points and exploit the behavioral differences in how client devices scan for, identify, and select access points.

 

HOMEPAGE – https://www.sans.org/cyber-security-courses/wireless-penetration-testing-ethical-hacking/

 

Original Price: $7,270
Our Price: $20

Description

Size: 2.26 GB

Who Should Attend SEC617?

  • Ethical hackers and penetration testers
  • Network security staff
  • Network and system administrators
  • Incident response teams
  • Information security policy decision-makers
  • Technical auditors
  • Information security consultants
  • Wireless system engineers
  • Embedded wireless system developers

You Will Be Able To

  • Identify and locate malicious rogue access points using free and low-cost tools
  • Conduct a penetration test against low-power wireless devices to identify control system and related wireless vulnerabilities
  • Identify vulnerabilities and bypass authentication mechanisms in Bluetooth networks
  • Utilize wireless capture tools to extract audio conversations and network traffic from DECT wireless phones
  • Implement a WPA2 Enterprise penetration test to exploit vulnerable wireless client systems for credential harvesting
  • Utilize Scapy to force custom packets to manipulate wireless networks in new ways, quickly building custom attack tools to meet specific penetration test requirements
  • Identify Wi-Fi attacks using network packet captures traces and freely available analysis tools
  • Identify and exploit shortcomings in the security of proximity key card systems
  • Decode proprietary radio signals using Software-Defined Radio
  • Mount a penetration test against numerous standards-based or proprietary wireless technologies