Introduction: Wireless Hacking and Security Tutorial

1.1 Welcome

>> Welcome to the Virtual Training Company. I'm Bobby Rogers, and I'm going to be your host for this Virtual Training Company course, Wireless Hacking and Security. We've designed this course to help both users. And system administrators understand all the different aspects of wireless security. Most of us have set up wireless networks in either our homes or in businesses. And we've had to secure those networks. Unfortunately, it often happens that we don't understand the security configuration settings we need to implement And, we also don't understand the consequences if we don't do it correctly. So this course is going to help you understand that. We're going to be looking at several topics, including general wireless security. We'll also look at vulnerability assessments and how to conduct them. If you are a security administrator. We're also going to look at the basics of wireless hacking. Now the reason we're doing this course is we want for this knowledge to help you to better secure wireless networks. Both in your home And in your business. Now one thing we should point out is that we're teaching you about wireless security in some aspects we're teaching about wireless hacking. Now you should know upfront that you should not use this knowledge To hacking to net networks that you don't own or don't have authorization to do. So you shouldn't use this knowledge to harm others or test or hack wireless networks without permission. So having said that, let's sit back and enjoy this course. This is going to be a fun course We're going to have lots of demonstrations and key tips about securing wireless networks. And I think you're going to get a lot out of them, so enjoy it.

1.2 Course Outline

[SOUND] Now let's talk about some of the topics we're going to discuss during this course. We assume up front that you know a little bit about wireless networking already, or you wouldn't be taking a more advanced course such as wireless security. But we're not going to assume too much. We're going to talk about the basics of wireless networking up front. Front, just to serve as a reminder for those of you who have done it before and kind of already know this stuff or to help out the folks who have never heard of some of these topics before, never heard of some of these terms and so forth. In any case, we're going to talk about wireless networking, the very basics of it, some of the protocols used and the standards, and how it differs from wired networks. Networks. We're also going to get in wireless security basics and look at the fundamental elements on how to secure a wireless network. Things like encryption and authentication or some of the topics will discuss. Then we'll move to wireless security protocols We'll talk about some of the protocols that make wireless security possible. We'll talk about their strengths and their weaknesses. We're talking about things like WEP, WPA, and WPA-2 in this case. We'll then look at securing desktop clients, just the fundamentals of how to secure a desktop client. We'll talk about things like encryption, authentication SSIDs, and so forth, and we'll look at a couple of different clients, such as Windows Analytics. We'll then move on to wireless access points. We'll talk about how to secure wireless access points to keep out unauthorized users. Then we'll move our attention to mobile wireless, because mobile wireless has permeated our society. We all use cell phones and tablets with wireless capabilities. so it's worthy of a discussion during this course. We'll also get wireless peripherals. And I'm talking about things such as wireless printers, wireless media centers, and so forth. Then we'll turn our attention to securing Bluetooth. Bluetooth is still a prevalent wireless technology that we use in cell phones, tablets, and mobile devices to help connect to each other. Then we're going to look at the hacking aspect of wireless security. And the first topic we'll look at for that. Is using wireless securing tools. Now there's a wide variety of tools out there that we can use as wireless security administrators, some open source, some commercial, and we're going to look at some the most popular ones. Now we're not going to in depth on some of these tools because the environment simply won't permit it and we're not going to cover every single tool out there possible that you could ever find. But we are going to teach you enough about using the tools that if you learn a few of them, the fundamentals, you can probably learn just about all of them. Then we're going to start the meat of the course, the wireless security testing itself, and this is going to be covered over several different sessions. And when we're talking wireless security testing, we really are talking wireless hacking Although, if you're professional, we try to avoid the term hacking. It's wireless security testing if you're doing it for professional reasons. We'll look at different exploits and different methods of attack and we'll look at how to defend against those attacks as well. After several sessions of looking at security testing, we'll talk about the legal issues involved with wireless. Things like unauthorized use of wireless networks, wardriving and things like that and how the law addresses those issues. And to cap off the course, we're going to be looking at Wireless Security Best Practices. These are best practices to secure your network that we gleaned from. Different commercial sources, industrial sources, and so forth. Things that are considered the best practices in the profession that we can do to secure wireless networks. Both at home and in the business. And we'll talk about those different things you can do. Right off the bat to secure wireless networks. Now a few comments about the course. We use a variety of both open source and commercial Windows and Linux tools. Now of course as I said before we're not going to teach you every single tool that's out there. There's no way we could do that because there are hundreds of them. We're going to look at some of the more popular ones out there. We'll look at the wireless tools. That are in BackTrack, one of the more popular penetration testing tool sets out there. And we'll look at a few other ones. We're not going to make you experts on every single tool, but we're going to teach you the fundamentals enough that you could learn a few tools and pick up any other tool that comes out that you'd like to use. Now while most of the course will be discussion of wireless security, we'll talk about some theory. Of that. And we'll also talk about practice also. So occasionally we'll have to talk about some of the basics. But we'll also get into some of the hardcore how to do this kind of thing. And that's probably where most people are interested in is the actual hands on and we'll have some of that. So we'll have demonstrations of course. We'll have some screenshots where necessary. And occasionally, we have to do a screenshot because it may be impractical to use the tool in this teaching environment. And we'll also look at configuration files because often those are key to securing things like a Wireless Access Point. So we have a good mix of both theory and practice in this course. And we think that it's the right mix and you'll get a lot out of the course. You'll learn the basics and the fundamentals of wireless security and hacking. And we hope that you enjoy it.

  • Disclaimer
  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, and OPM3 are registered marks of the Project Management Institute, Inc.

We use cookies on this site for functional and analytical purposes. By using the site, you agree to be cookied and to our Terms of Use. Find out more

Request more information

For individuals
For business
Phone Number*
Your Message (Optional)

By proceeding, you agree to our Terms of Use and Privacy Policy

We are looking into your query.
Our consultants will get in touch with you soon.

A Simplilearn representative will get back to you in one business day.

First Name*
Last Name*
Phone Number*
Job Title*

By proceeding, you agree to our Terms of Use and Privacy Policy