Course description
Much as mobile platforms have changed society as a whole, they have also radically altered the battlespace between hackers and the security professionals dedicated to stopping them. In this session, Rafiq Wayani will discuss how hackers are using wireless networks to attack and evade traditional security tools, intrusion detection systems, firewalls, and honeypots. This course is part of a series covering EC-Council's Certified Ethical Hacker (CEH).
Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.
Prerequisites
To get the most out of this course, this course assumes that you have a good working knowledge of Linux and Windows based networking environments. It also assumes that you have experience with managing a network, have worked with networking hardware such as switches & routers, are familiar with MS Active Directory (AD) Domain based authentication, know how to work with command-line utilities, and understand the basics of Web Server environments. Many of the demonstrations in this course use the Windows 7 and Kali Linux operating systems which can be downloaded free from the respective sites. All of the demonstrations are created in a virtual environment using Oracle VirtualBox and VMware vSphere 6.
Meet the expert
Rafiq Wayani has extensive experience including more than 20 years in IT as Systems Architect, Software Engineer, DBA, and Project Manager. Wayani has instructed in a variety of technical areas, has designed and implemented network and information systems, and is certified across a wide range of platforms and systems including Microsoft Solutions Developer, Systems Engineer, Application Developer, Database Administrator, Trainer; Novell Netware Administrator and Engineer; Master Certified Netware Engineer; and A Certified.
Video Runtime
104 Minutes
Time to complete
144 Minutes
Course Outline
Wireless Networking Concepts (05:35)
Wireless Encryption (06:59)
Wireless Threats (09:53)
Wireless Hacking Methodology (08:55)
Wireless Bluetooth Hacking (07:22)
Wireless Countermeasures (08:06)
IDS, Firewalls, and Honeypots (08:35)
Evading IDS (06:25)
Evading Firewalls (15:04)
Evading Firewall Tools (11:26)
Detecting Honeypots (02:56)
IDS Evasion Countermeasures (04:34)
IDS Penetration Testing (08:06)