Companies Home Search Profile

Specialized Attacks: Wireless

Focused View

Matthew Lloyd Davies

1:07:46

90 View
  • 1. Course Overview.mp4
    01:36
  • 1. Tactics and Techniques for Wireless Attacks.mp4
    06:04
  • 2. Building a Wireless Test Environment.mp4
    03:31
  • 3. Demo - Sniffing and Dissecting WiFi Frames.mp4
    04:27
  • 4. Demo - Creating a Rogue Access Point.mp4
    03:56
  • 1. Demo - Exploiting Wireless Authentication Weaknesses.mp4
    02:31
  • 2. Demo - Beating MAC Filters.mp4
    03:52
  • 3. Bypassing Shared Key Authentication.mp4
    04:39
  • 1. Demo - Cracking WEP.mp4
    05:28
  • 2. Demo - Cracking WPA Encryption with a Dictionary Attack.mp4
    06:16
  • 3. Cracking WPAWPA2.mp4
    04:02
  • 4. Demo - The KRACK Attack.mp4
    04:48
  • 1. Demo - Eavesdropping.mp4
    06:19
  • 2. Attacks Against Integrity - DNS Spoofing.mp4
    02:23
  • 3. Demo - Denial of Service Attacks.mp4
    04:35
  • 4. Where Next.mp4
    03:19
  • Description


    This course will teach you to identify the vectors and techniques used by threat actors to gain access to networks and systems via wireless technologies.

    What You'll Learn?


      Wireless systems are ubiquitous in society and so they are a prime target for exploitation by cyber criminals and hostile states. Threat actors target wireless networks to gain an initial foothold in a network, to steal information, or conduct ransomware attacks. In this course, Specialized Attacks: Wireless, you’ll learn to exploit weaknesses in wireless protocols, infrastructure, and client devices that are targeted by real-world threat actors. First, you’ll review various radio protocols to understand where they fit into the data-rate versus range spectrum, and how their implementation makes them susceptible to hacking. Next, you’ll look at specific techniques to target wireless protocols, infrastructure, and client devices to gain access to networks and assets, steal information, and deny access to systems. Finally, you’ll combine some of these techniques to create advanced attacks that are used by real-world threat actors to gain access to systems and networks. By the end of this course, you’ll be able to identify weaknesses in wireless assets and systems, and make recommendations to improve the security posture of an organization’s wireless network infrastructure.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Matthew Lloyd Davies
    Matthew Lloyd Davies
    Instructor's Courses
    With a background in Chemical Engineering and a career meandering through explosives safety research and accident investigation, Matt is now a Principal inspector and Deputy Professional Lead for Cyber Security and Information Assurance at the Office for Nuclear Regulation in the UK. For 11 years he has regulated nuclear safety and nuclear security across the whole of the UK’s nuclear estate and is currently responsible for regulating cyber security and information assurance across various parts of the nuclear fuel cycle. He is also responsible for developing ONR’s CS&IA regulatory capacity and capability and, as a GIAC certified penetration tester and incident handler, is the lead for technical assurance activities. Matt has planned and run national cyber security exercises that have simulated cyber-attacks against industrial control systems and has run projects to develop new and novel techniques for conducting assurance activities against industrial control systems.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 16
    • duration 1:07:46
    • level average
    • English subtitles has
    • Release Date 2022/12/31

    Courses related to Ethical Hacking

    Courses related to Cyber Security

    Courses related to Wireless Networking

    Subtitle
    Aruba Wireless Training With Labs For ACMA ACMP
    HCIP-R&S 2.5
    HuaweiHCIP-R&S 2.5
    35:29:51
    04/26/2023