As attackers shift their techniques to attack not only technology but people, it is imperative that you are as vigilant as ever. In this course, Wireless Network Penetration Testing Advanced Techniques, you'll focus on red teaming attacks so that you can identify the weaknesses in your own wireless networks and stop a potential compromise from ever occurring. First, you'll delve into rogue access points and fake captive portals. Next, you'll learn about man-in-the-middle attacks, which can intercept and modify data in transit. Lastly, you'll explore denial-of-service techniques that attackers use to distract incident response teams. By the end of this course, you'll be able to perform a wireless penetration test using advanced techniques, targeting not only technologies, but also people.
Learning Objectives
- Wireless Penetration Testing
- Preparing for the Tests
- Non-disruptive Attacks
- Disruptive Attacks
- Covering Your Traces
Framework Connections
Specialty Areas
- Vulnerability Assessment and Management
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.