Join us at the Wireless Security professional workshop
Terminus System Information Security Workshops & Training Courses
LEARN HOW TO FIND YOUR OWN SYSTEMS VULNERABILITIES BEFORE THE BAD GUYS ATTACK THEM
How can you assess the security of your Wireless Network?
Learn how to test the security of your Wireless Networks using techniques attackers use such as sniffing, cracking, spoofing, injecting, replaying and bypassing authentication. You will learn this hands-on at our Wireless Network Security Workshop. This is one workshop series you wouldn’t want to miss!
This hands-on course focuses on tactics, techniques, and procedures used by both black hat attackers and penetration testers (white hat hackers).
The workshop starts with an overview of hacking incidents, trends, and attacker motivations. The course progresses to penetration testing methodologies. These often overly complicated methodologies, filled with an excessive number of steps, are simplified in this course with an emphasis on the penetration test objective.
Each hacking phase of the simplified methodology is demonstrated, discussed, and practiced. Attendees practice penetration testing in a fun and interactive environment with multiple live targets.
Is this Workshop for you?
If you have been considering upgrading your knowledgewireless network security testing and enhance your organizations capability to manage its network infrastructure, this workshop is for you.
Learn from the Pros on how to analyze the weakness in your wireless infrastructure, assess how it can impact your business if exploited, and know how to defend your network infrastructure from malicious attacks.
THIS WORKSHOP IS A 1-DAY TRAINING CURRICULUM THAT PREPARES STUDENTS TO PROTECT THEIR WIRELESS NETWORKS
This workshop is an instructor-led, group-live instruction that includes relevant topics and hands-on practical exercises. Scenario-based practical exercises will be performed. Students will be shown how to select from a variety of open source (free) security tools and employ techniques to successfully secure their personal data.
This workshop can accommodate up to 15 students
This workshop is designed to introduce wireless cyber security threats, network protection techniques, and operational security controls.
Session 1: Wireless Hacking
- Hidden SSID
- Bypass MAC Filtering
- Cracking WEP
- WPA and WPA2 Cracking
Session 2: Identifying the Target
- Basic principles of reconnaissance
- Open Source Intelligence
- Stealth Scanning Strategies
- Identifying the Network Infrastructure
- Enumerating Hosts
- Port, Operating System and Service Discovery
Session 3 : Vulnerability scanning and Assessment
- Installing and configuring NESSUS
- Vulnerability Scanning
- Generating Vulnerability Report
Session 4: Exploitation
- Basics of Metasploit Framework
- Windows 10 Exploitation
- Pivoting and Port forwarding
- Bypassing Windows User Account Control
- Session 5 Social Engineering
- Social Engineering Toolkit
- Hiding Executables and Obfuscating the Attacker’s URL
- Escalating an Attack using DNS Re-direction
- Cloning Web Sites
Session 6 : Password Attacks
- Capturing insecure passwords (http)
- Capturing secure passwords (https)
- Cracking System Passwords
- Wireless Network Penetration Testing
- The Cybercrime Threat Landscape
- User Intelligence
- How Cyber Security works
- Penetration Testing
- Ethical Hacking
- Wireless Security
- Wireless hacking
- Best Practices in Responding to the next Vulnerability
- Proactive Monitoring
- Security Information Management
- Physical Attacks & Social Engineering
- Gather information from open and public sources
- Learn procedures for scanning and enumerating wireless networks
- Use foot printing techniques to map a target network
- Use packet crafting techniques to identify wireless devices
- Use scanners in order to profile wireless network and devices
- Use data packet analysis tools
- Use packet injection and replay for network penetration
- Find Security Vulnerabilities
- Bypass Authentication
- Use Rogue Access Points
- Exploit the vulnerabilities
- Learn Wireless Network Attacking Technique
For more information or if you would like to register, visit our web site www.terminus-system.com or email email@example.com