About this video

There are many tools available on the market for detecting security loopholes and networking attacks. Selecting the right tools and methods might seem confusing, but this course is designed to help navigate through those choices. This course will demonstrate how to perform wireless penetration attacks against wireless networks and their protocols in order to build strong and robust security systems from the ground up using the most popular tools in the penetration testing community.

In this course, you’ll learn some basic wireless theory before learning how to hack each type of wireless security commonly used in today’s networks, including WEP, WPA, and WPA2. Using commonly available open source toolsets, you’ll understand the key components of the wireless penetration testing process, including setting up your own wireless penetration testing lab, conducting wireless network reconnaissance (WLAN discovery), packet sniffing and injection, and client attacks.

Style and Approach

Using a step-by-step methodology, you’ll learn how to conduct a wireless penetration test from reconnaissance to gaining access onto the network, regardless of the security methods being use to protect it. The course is designed as a fun and informative walkthrough of the various techniques used by professional penetration testers in the real world.

Publication date:
April 2018
Publisher
Packt
Duration
2 hours 22 minutes
ISBN
9781786468581

About the Author

  • Jason Dion

    Jason Dion, CISSP No. 349867, is an adjunct instructor at Liberty University's College of Engineering and Computational Science and Anne Arundel Community College's Department of Computing Technologies with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), Security+, Network+, A+, PRINCE2, and Information Technology Infrastructure Library v3. He has been a deputy director of a network operations center, and an information systems officer for large organizations around the globe.

    Browse publications by this author
Wireless Penetration Testing for Ethical Hackers [Video]
Unlock this video and the full library for $5 a month*
Start now