Wireless Ethical Hacking & Penetration Testing Hands-on Masterclass

These courses are postpone until further notice, Thanks.

The Wireless Penetration Testing & Wireless Hacking Masterclass is designed to introduce wireless cyber security threats, network protection techniques, and operational security controls.

Wireless Ethical Hacking & Penetration Testing Hands-on Masterclass

These courses are postpone until further notice, Thanks.
Online Courses via Zoom
9:00am – 5:00pm

The course exposes information security professionals
to the latest ethical hacking tools and techniques.

For hands-on experience,
each student receives access to a virtual penetration testing lab
where techniques learned within the course can be practiced

Overview

LEARN THE BEST WAYS TO TEST YOUR OWN SYSTEMS BEFORE THE BAD GUYS ATTACK

This advanced, highly technical session offers IT
professionals the opportunity to acquire critical cyber security skills during
one day of intensive, hands-on training.

Real World Performance-Based Information Security Training

The Wireless Penetration Testing & Wireless Hacking Masterclass
is designed to introduce wireless cyber security threats,
network protection techniques, and operational security controls.

– Live demonstration of various hacking techniques

– Introduction to network and computer system attacks

– Teach various hacking techniques for an ethical purpose

– How to protect against network threats and attacks

 – Introduction to the open source tools available for hacking

 – Gather information from open and public sources


How can you assess the security of your Wireless Network?

Learn how to test the security of your Wireless Networks using techniques attackers use such as sniffing, cracking, spoofing, injecting,
replaying and bypassing authentication.

You will learn this hands-on at our
Wireless Hacking & Penetration Testing Masterclass.
This is one workshop series you wouldn’t want to miss!

This hands-on course focuses on tactics, techniques, and procedures used by both black hat attackers and penetration testers (white hat hackers).

The course starts with an overview of hacking incidents, trends, and attacker motivations.
 

The course progresses to penetration testing methodologies.
 

These often overly complicated methodologies, filled with an excessive number of steps, are simplified in this course with an emphasis on the penetration test objective.
 
Each hacking phase of the simplified methodology is demonstrated, discussed, and practiced.
 

Attendees practice penetration testing in a fun and interactive environment with multiple live targets.

Is this Workshop for you?

If you have been considering
upgrading your knowledge in wireless security management, develop your skills in wireless security testing and enhance your organization’s capability to manage its wireless infrastructure,
this workshop is for you.

Learn from the Pros on how to analyse the weakness in your wireless infrastructure, assess how it can impact your business if exploited, and know how to defend your wireless infrastructure from malicious attacks.

THIS COURSE IS A 1-DAY TRAINING CURRICULUM THAT PREPARES THE PARTICIPANTS TO PROTECT THEMSELVES WHILE OPERATING ON UNTRUSTED (PUBLIC) NETWORKS.

Threats are explained in detail, from identity theft to hacking and include adversarial operational hacking techniques. Students are given practical solutions to real world adversarial cyber threats that may occur while in an operational capacity. They also learn practical data encryption and the skills necessary to anonymize Internet communications, including. e-mail, web surfing, and Voice over IP (VoIP) in all major operating system environments.
 

This course is an instructor-led, group-live instruction that includes relevant topics and hands-on practical exercises. Scenario-based practical exercises will be performed. Students will be shown how to select from a variety of open source (free) security tools and employ techniques to successfully secure their personal data.
 

Through the application of rigorous methodologies, the use of automated scanning tools, customised proprietary scripts and manual techniques, we test for exploitable vulnerabilities that could allow unauthorised access to key information assets.

 

Emphasis is placed on learning, demonstrating, and practicing the primary tactics – reconnaissance (active and passive), vulnerability discovery and identification, exploitation, and persistence. Numerous methods are covered to include server-side exploits, client-side exploits, man-in-the-middle (MITM), and social engineering.

 

AGENDA / TOPICS COVERED

Session 1: Wireless Hacking
• Hidden SSID
• Bypass MAC Filtering
• Cracking WEP
• WPA and WPA2 Cracking

 

Session 2: Identifying the Target
• Basic principles of reconnaissance
• Open Source Intelligence
• Stealth Scanning Strategies
• Identifying the Network Infrastructure
• Enumerating Hosts
• Port, Operating System and Service Discovery

 

Session 3 : Vulnerability scanning and Assessment
• Installing and configuring NESSUS
• Vulnerability Scanning
• Generating Vulnerability Report


Session 4: Exploitation
• Basics of Metasploit Framework
• Windows 10 Exploitation
• Pivoting and Port forwarding
• Bypassing Windows User Account Control

 

Session 5 Social Engineering
• Social Engineering Toolkit
• Hiding Executables and Obfuscating the Attacker’s URL
• Escalating an Attack using DNS Re-direction
• Cloning Web Sites

 

Session 6 : Password Attacks
• Capturing insecure passwords (http)
• Capturing secure passwords (https)
• Cracking System Passwords

 

 

HANDS-ON TRAINING

Wireless Network Penetration Testing
The Cybercrime Threat Landscape
User Intelligence
How Cyber Security works
Penetration Testing
Ethical Hacking
Wireless Security
Wireless hacking
Best Practices in Responding to the next Vulnerability
Proactive Monitoring
Security Information Management
Physical Attacks & Social Engineering
Gather information from open and public sources
Learn procedures for scanning and enumerating wireless networks
Use foot printing techniques to map a target network
Use packet crafting techniques to identify wireless devices
Use scanners in order to profile wireless network and devices
Use data packet analysis tools
Use packet injection and replay for network penetration
Find Security Vulnerabilities
Bypass Authentication
Use Rogue Access Points
Exploit the vulnerabilities
Learn Wireless Network Attacking Techniques

This workshop is 100% PRACTICAL

Latest Techniques
You will learn proven techniques to protect wireless networks by employing offensive security techniques and learn to defend it.

 

Course Instructor

Muhammad Alkhattab (CEH,CCNP)
Information Security Specialist

CERTIFICATIONS, TECHNICAL SKILLS & EXPERIENCE
CCNA I CCNP I OCP
I Certified Ethical Hacker – EC-Council(CEH) I MCSE I MCP – Microsoft – EC-Council I MASTER ASE I SUN SOLARIS ADMINISTRATOR

PROGRAMMING LANGUAGES
Java, C/C++, Visual Basic, Python 2 / 3

PENETRATION TESTING / VULNERABILITY EXPLOITATION
Windows Exploitation I Linux Exploitation I Wireless Hacking
I Password Cracking I Network Sniffing I Vulnerability Scanning and Exploitation I Enumerating Windows Users I Google Hacking and Harvesting I Web Exploitation

INFORMATION SECURITY STANDARDS AND FRAMEWORKS
ISO27001 I OCTAVE I Common Criteria (CC)
PCIDSS I COBIT I COSO-ERM

MALWARE ANALYSIS TOOLS
Remnux Distro I Viper Malware Analysis Framework I MASTIFF Framework I CUCKOO Sandbox

ROUTING & SWITCHING
Complete Router and Switch Configuration including Access Control Lists I Routing Protocols I VLANs

CLOUD COMPUTING PLATFORMS
Ubuntu Enterprise Cloud (UEC)
Eucalyptus I Open Nabuella I Ubuntu Open Stack

OS PLATFORMS
Kali Linux I Backtrack 3-5 I Ubuntu 12.04 LTS
Linux Red Hat I Microsoft Windows Server 2016 (Active Directory Implementation)

Unique responsibility
As a cybersecurity professional, you have a unique responsibility to find and understand your wireless network’s vulnerabilities
and work diligently to fortify it before the bad guys compromise it.

Reserve Your Spot

Masterclass fee

$400.00