This hands-on course is all about WiFi and the security of wireless networks. We will study different threats, vulnerabilities and attack methods. We’ll discuss the advantages and disadvantages of various attacks and how to use the corresponding hacking tools.
In your training lessons and lab exercises, you will practice different “real world” attack scenarios step by step. We will also look at defensive countermeasures and study available options for hardening wireless network components and system settings.
You will acquire the necessary technical and organizational skills as a wireless network security expert – both, offensive (analyst/auditor/pen tester) and defensive (security expert/administrator/consultant).
All assessment- and hacking tools in this course are free of charge, most of them are open source. You can either install them on your own operating system (Linux recommended) or you can use a pre-configured, ready to go Kali Linux distribution. For practical training sessions, make sure that all exercises are conformable to law. We strongly discourage any attempt to illegal hacking activities.
Over the course, you will regularly work through small tasks and receive tips and feedback from the course leader. You will discuss the course contents together with other participants in internal discussion forums and are able to participate in expert exchanges. Finally, towards the end of the course, you will create a short text based on a self-selected question (task takes a half to whole day).
Certificate of completion: if you completed your homework and your participation was regular you will receive upon completing the course a certificate of completion. The small tests are exclusively for your personal self-assessment; no grade is given.
2 weeks, Online, Instructor-Led
- Wireless technology overview: WiFi, Bluetooth and Co.
- IEEE 802.11 and relevant WiFi standards in detail
- User authentisierung: methods, weaknesses, advantages and disadvantages
- Cryptographic basics to provide an understanding of known protocol weaknesses
- Threats, vulnerabilities and attack scenarios
- Wireless data package analysis with Wireshark and Co.
- Hacking tools: how to select the right tools depending on objective target, tool usage and practical advice
- Covert tracking of people and patterns of behavior
- Intercepting targets in hotels, airports and via rogue access points
- Industrial espionage and how to prevent it
- War driving
- Denial of service attacks on individuals and/or networks
- Secure configuration of wireless networks, routers and endpoints
- Evaluation and discussion of practical exercises and lessons learned