Course Overview

Key Features

  • 9 Hrs of HQ e-learning content
  • 104 High Quality Lectures
  • Basics of Wirless Security, Security Protocols
  • Covers Wireless Security Testing, Securing Bluetooth
  • Course Completion Certificate

Training Options

Self-Paced Learning

$ 99

  • Lifetime access to high-quality self-paced e-learning content curated by industry experts
  • 24x7 learner assistance and support

Corporate Training

Customized to your team's needs

  • Blended learning delivery model (self-paced eLearning and/or instructor-led options)
  • Flexible pricing options
  • Enterprise grade Learning Management System (LMS)
  • Enterprise dashboards for individuals and teams
  • 24x7 learner assistance and support

Course Curriculum

Course Content

  • Wireless Hacking and Security

    Preview
    • Module 01 - Introduction

      06:56Preview
      • 1.1 Welcome
        01:44
      • 1.2 Course Outline
        05:12
    • Module 02 - Overview of Wireless Networking

      32:34Preview
      • 2.1 Wireless Terminology
        04:16
      • 2.2 Wireless Basics
        04:09
      • 2.3 Wireless Hardware
        04:28
      • 2.4 Wireless Transmission Methods
        03:14
      • 2.5 802.11 Standards pt. 1
        04:40
      • 2.6 802.11 Standards pt. 2
        04:17
      • 2.7 Other Standards
        02:42
      • 2.8 Wireless Topologies
        04:48
    • Module 03 - Wireless Security Basics

      25:35Preview
      • 3.1 Wireless vs Wired Networks
        02:51
      • 3.2 Wireless Security Issues
        03:38
      • 3.3 Encryption
        03:14
      • 3.4 Authentication
        05:41
      • 3.5 SSID Broadcasting
        04:37
      • 3.6 MAC Address Filtering
        05:34
    • Module 04 - Wireless Security Protocols

      33:41Preview
      • 4.1 WEP
        05:53
      • 4.2 WPA
        03:52
      • 4.3 WPA2
        04:21
      • 4.4 802.1x
        04:10
      • 4.5 EAP
        04:53
      • 4.6 WAP
        05:03
      • 4.7 Authentication Methods
        05:29
    • Module 05 - Securing Desktop Clients

      37:30Preview
      • 5.1 General Client Security
        06:47
      • 5.2 Legacy Clients
        04:58
      • 5.3 Securing Windows 7 and 8
        06:31
      • 5.4 Securing a Linux Client
        06:02
      • 5.5 Physical Security
        06:45
      • 5.6 Security Policies and Enforcement
        06:27
    • Module 06 - Wireless Access Points

      32:33Preview
      • 6.1 Securing WAPs pt. 1
        04:02
      • 6.2 Securing WAPs pt. 2
        05:18
      • 6.3 Securing WAP Traffic pt. 1
        06:52
      • 6.4 Securing WAP Traffic pt. 2
        06:01
      • 6.5 Securing Client Access
        04:52
      • 6.6 AP Physical Security
        05:28
    • Module 07 - Mobile Wireless

      26:47
      • 7.1 Securing Smartphones
        07:05
      • 7.2 Securing Tablets
        03:52
      • 7.3 WiMAX
        05:42
      • 7.4 ZigBee
        05:54
      • 7.5 RFID
        04:14
    • Module 08 - Securing Bluetooth

      26:33Preview
      • 8.1 Overview of Bluetooth
        04:27
      • 8.2 Bluetooth Weaknesses
        03:45
      • 8.3 Bluetooth Security Features
        05:19
      • 8.4 Bluetooth Attacks
        03:48
      • 8.5 Bluetooth Attack Tools
        05:24
      • 8.6 Securing Bluetooth
        03:50
    • Module 09 - Hacking Basics

      41:29Preview
      • 9.1 Intro to Penetration Testing
        05:29
      • 9.2 Wardriving and Warchalking
        04:41
      • 9.3 Methodology
        06:15
      • 9.4 Goals
        06:14
      • 9.5 Planning the Test
        06:41
      • 9.6 Conducting the Test
        05:54
      • 9.7 Professional Conduct
        06:15
    • Module 10 - Wireless Security Tools

      01:01:40Preview
      • 10.1 Intro to Security Tools
        04:54
      • 10.2 Hardware
        06:19
      • 10.3 Pen Testing Platforms
        06:16
      • 10.4 Backtrack Toolset
        05:41
      • 10.5 Kismet
        04:21
      • 10.6 Aircrack-ng
        06:25
      • 10.7 Gerix
        05:58
      • 10.8 Wireshark
        06:14
      • 10.9 Net Stumbler
        04:16
      • 10.10 Modern Windows Tools
        06:24
      • 10.11 Other Tools
        04:52
    • Module 11 - Wireless Security Testing Section One

      48:35Preview
      • 11.1 Setting Up Hardware
        06:54
      • 11.2 Verifying Hardware
        05:08
      • 11.3 Monitor Mode pt. 1
        04:19
      • 11.4 Monitor Mode pt. 2
        03:54
      • 11.5 Scanning
        05:30
      • 11.6 Capturing Traffic pt. 1
        06:00
      • 11.7 Capturing Traffic pt. 2
        04:46
      • 11.8 Viewing Traffic Captures pt. 1
        05:05
      • 11.9 Viewing Traffic Captures pt. 2
        06:59
    • Module 12 - Wireless Security Testing Section Two

      35:47Preview
      • 12.1 WEP Attacks
        03:15
      • 12.2 Aireplay-ng Attacks
        06:01
      • 12.3 Fake Authentication
        04:33
      • 12.4 Deauthentication Attacks
        05:50
      • 12.5 ARP Replay Attacks
        05:22
      • 12.6 Cracking WEP pt. 1
        04:59
      • 12.7 Cracking WEP pt. 2
        05:47
    • Module 13 - Wireless Security Testing Section Three

      25:30Preview
      • 13.1 WPA Attacks
        02:41
      • 13.2 Cracking WPA pt. 1
        02:30
      • 13.3 Cracking WPA pt. 2
        03:38
      • 13.4 Rogue APs
        06:06
      • 13.5 Detecting Rogue APs
        04:11
      • 13.6 Attacking Past Wireless
        06:24
    • Module 14 - Legal Issues

      29:31
      • 14.1 Intro to Legal Issues
        03:49
      • 14.2 Laws and Regulations pt. 1
        06:22
      • 14.3 Laws and Regulations pt. 2
        06:19
      • 14.4 Laws and Regulations pt. 3
        06:30
      • 14.5 Liability
        06:31
    • Module 15 - Wireless Security Best Practices

      44:11Preview
      • 15.1 Wireless Security Standards
        05:27
      • 15.2 Designing the Network
        06:10
      • 15.3 Configuring Wireless Clients
        05:29
      • 15.4 Configuring Access Points
        05:46
      • 15.5 Securing Users
        05:05
      • 15.6 Connecting Different Networks
        05:53
      • 15.7 Corporate Policies
        04:58
      • 15.8 Security Testing
        05:23
    • Module 16 - Conclusion

      17:36Preview
      • 16.1 Resources
        03:26
      • 16.2 Wireless Tools
        07:13
      • 16.3 Certifications
        03:44
      • 16.4 Course Wrap Up
        03:13
    • Module 17 - Credits

      01:25
      • 17.1 About the Author
        01:25

Why Online Bootcamp

  • Develop skills for real career growthCutting-edge curriculum designed in guidance with industry and academia to develop job-ready skills
  • Learn from experts active in their field, not out-of-touch trainersLeading practitioners who bring current best practices and case studies to sessions that fit into your work schedule.
  • Learn by working on real-world problemsCapstone projects involving real world data sets with virtual labs for hands-on learning
  • Structured guidance ensuring learning never stops24x7 Learning support from mentors and a community of like-minded peers to resolve any conceptual doubts

FAQs

  • What payment options are available?

    You can enroll for the online training through our website. You can make online payment using any of the following options:
    • Visa debit/credit card
    • American Express and Diners Club cards
    • Master Card
    • PayPal
    Once the online payment is done, you will automatically receive payment receipt, via email.

  • What will I get along with this training?

    In this training, you will have access to online e-learning and case studies.

  • Can I cancel my enrollment? Will I get a refund?

    Yes! You can cancel your enrollment. We will provide you complete refund after deducting the administration fee. To know more, please go through our Refund Policy.

  • Do you provide money back guarantee for the training programs?

    Yes. We do offer a money-back guarantee for many of our training programs. You can refer to the Refund Policy and raise refund requests via our Help and Support portal.

  • Can I extend the access period?

    Yes, you can extend the access period by paying an additional fee. Please raise a request via our Help and Support portal.

  • Where and how can I access the e-learning content? Are there any limitations?

    Once you register with us for a course by paying the course fee, you can have 24/7 access to the e-learning content on our website. An automated course purchase confirmation mail from our side will guide you through the process.

  • I am not able to access the online course. Whom should I contact for a solution?

    Please raise a request via our Help and Support portal to have your issue resolved.

  • How will I get my course completion certificate from Simplilearn?

    We offer course completion certificate after you successfully complete the training program.

  • I’d like to learn more about this training program. Who should I contact?

    Contact us using the form on the right of any page on the Simplilearn website, or select the Live Chat link. Our customer service representatives will be able to give you more details.

  • Disclaimer
  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, and OPM3 are registered marks of the Project Management Institute, Inc.