• Online, Self-Paced
Course Description

As attackers shift their techniques to attack not only technology but people, it is imperative that you are as vigilant as ever. In this course, Wireless Network Penetration Testing Advanced Techniques, you'll focus on red teaming attacks so that you can identify the weaknesses in your own wireless networks and stop a potential compromise from ever occurring. First, you'll delve into rogue access points and fake captive portals. Next, you'll learn about man-in-the-middle attacks, which can intercept and modify data in transit. Lastly, you'll explore denial-of-service techniques that attackers use to distract incident response teams. By the end of this course, you'll be able to perform a wireless penetration test using advanced techniques, targeting not only technologies, but also people.

Learning Objectives

  • Wireless Penetration Testing
  • Preparing for the Tests
  • Non-disruptive Attacks
  • Disruptive Attacks
  • Covering Your Traces

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Vulnerability Assessment and Management

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.