Wireless Attacks and Countermeasures
This course is included in our On-demand training solution.
Wireless networking is becoming more and more prevalent in corporate networks. The methods used to set up and secure these networks are often tested by hackers to see if they can penetrate and gain information from them. This course examines wireless systems and 802.11x WLAN operational modes. This course discusses WEP and other wireless security protocols, along with WLAN threats, wireless hacking tools, and the security countermeasures that can be used to counter these threats. This course also assists students who are preparing for the EC Council’s Ethical Hacking and Countermeasures (CEHv6) exam 312-50.
Existing or in-training IT security professionals seeking detailed security penetration testing skills
A technical background with a solid understanding of networks and networking concepts, such as TCP/IP, IP Routing, and LAN Switching, as well as Windows and/or UNIX/LINUX operating systems; a general familiarity with the principles and usage of command-line, coding, and GUI-based technologies for manipulating IT operating systems
Cellular Phone Networks
Wireless LAN RF Technologies and Bluetooth
802.11x and Authentication Protocols
802.11x and Bluetooth Security
WEP and WPA
WLAN Threats and Wireless Hacking Tools
Securing Wireless Systems
Countering Wireless Network Attacks