Wireless Networks, IoT, and Mobile Devices Hacking (The Art of Hacking Series)

More than 5 hours of video instruction to help you learn the skills necessary to perform advanced penetration testing of wireless networks and Internet of Things (IoT) devices.

Wireless Networks, IoT, and Mobile Devices Hacking (The Art of Hacking Series)

Course Description

Wireless Networks, IoT, and Mobile Devices Hacking from Pearson provides step-by-step real-life, advanced scenarios of performing security assessments (penetration testing) of wireless networks and how to perform security posture assessments of Internet of Things (IoT) technologies and solutions. You also learn how to perform security posture assessments of mobile devices, such as smartphones, tablets, and wearables. Get step-by-step guidance so you can learn ethical hacking, penetration testing, and security posture assessment. You also learn the various concepts associated with many different leading-edge offensive security skills in the industry. Full of multimedia tutorials and hands-on demos that users can apply to real-world scenarios, this is a must for anyone interested in pursuing an ethical hacking career. Resource... Read More »

Wireless Networks, IoT, and Mobile Devices Hacking from Pearson provides step-by-step real-life, advanced scenarios of performing security assessments (penetration testing) of wireless networks and how to perform security posture assessments of Internet of Things (IoT) technologies and solutions. You also learn how to perform security posture assessments of mobile devices, such as smartphones, tablets, and wearables.

Get step-by-step guidance so you can learn ethical hacking, penetration testing, and security posture assessment. You also learn the various concepts associated with many different leading-edge offensive security skills in the industry. Full of multimedia tutorials and hands-on demos that users can apply to real-world scenarios, this is a must for anyone interested in pursuing an ethical hacking career.

Resources:
This is apart of The Art of Hacking Series: Security Penetration Testing The Art of Hacking Series LiveLessons.

Topics that will be covered in this lesson:

  • Introduction to wireless technologies and protocols
  • Wireless infrastructure attacks
  • Wireless client attacks
  • Building your lab and attack hardware
  • Aircracking
  • Cracking WEP
  • Hacking WPA
  • Performing wireless reconnaissance
  • Evil twins and rogue access points
  • Bluetooth security assessment and monitoring
  • NFC security assessment
  • Wireless defenses
  • Performing security assessments of IoT devices
  • Mobile device security
  • Hacking Android devices
  • Hacking iOS devices

You will learn how to:

  • Build your own wireless hacking labs and know what type of hardware you can use to perform wireless hacking
  • Use several open-source tools, such as Aircracking
  • Crack WEP and examine different attacks against WPA
  • Perform wireless reconnaissance
  • Perform evil twin attacks, creating rogue access points
  • Performing security assessments of Bluetooth and NFC implementations
Read Less
Course Details:

Target Audience

  • Any network and security professional who is starting a career in ethical hacking
  • Individuals preparing for the CompTIA PenTest+, the Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), and any other ethical hacking certification
  • Any cybersecurity professional who wants to learn the skills required to becoming a professional ethical hacker or who wants to learn more about general security penetration testing methodologies and concepts

Prerequisites

  • In order to take this course, you require basic knowledge of networking and cybersecurity concepts and technologies.
Certificate Info:

Type of Certification

Certificate of Completion

Format of Certification

Digital and Print

Professional Association/Affiliation

This certificate is issued by Pearson LearnIT

Method of Obtaining Certification

Upon successful completion of the course, participants will receive a certificate of completion.

Course Outline

  • Wireless Networks, IoT, and Mobile Devices Hacking (The Art of Hacking Series):Introduction
  • Learning objectives
  • 1.1 Introducing Wireless Hacking
  • 1.2 Introducing Wireless Standards and Technologies
  • 1.3 Understanding the 802.11 Standard
  • 1.4 Understanding Bluetooth
  • 1.5 Understanding NFC
  • 1.6 Understanding 802.1x and Wireless Authentication Mechanisms
  • Learning objectives
  • 2.1 Understanding Wireless Client Attacks and Their Motives
  • 2.2 Learning Packet Injection Attacks
  • 2.3 Eavesdropping and Manipulating Unencrypted Wi-Fi Communications
  • 2.4 Attacking Publicly Secure Packet Forwarding (PSPF)
  • 2.5 Attacking the Preferred Network List (PNL)
  • Learning objectives
  • 3.1 Understanding Wireless Antennas
  • 3.2 Surveying Wi-Fi Devices Like the Pinneaple
  • 3.3 Building Your Own Lab
  • Learning objectives
  • 4.1 Introducing the Aircrack-ng Suite
  • 4.2 Introducing Airmon-ng
  • 4.3 Understanding Airodump-ng
  • 4.4 Introducing Aireplay-ng
  • 4.5 Introducing Airdecap-ng
  • 4.6 Introducing Airserv-ng
  • 4.7 Introducing Airtun-ngM
  • Learning objectives
  • 5.1 Understanding WEP Fundamentals
  • 5.2 Learning How to Crack WEP
  • Learning objectives
  • 6.1 Understanding WPA Fundamentals
  • 6.2 Surveying Attacks Against WPA2-PSK Networks
  • 6.3 Using coWPAtty
  • 6.4 Using Pyrit
  • 6.5 Exploring WPA Enterprise Hacking
  • Learning objectives
  • 7.1 Using Kismet
  • 7.2 Using Wireshark
  • 7.3 Learning How to Hack Default Configurations
  • Learning objectives
  • 8.1 Defining Evil Twin Attacks
  • 8.2 Performing Evil Twin Attacks
  • 8.3 Using Karmetasploit
  • 8.4 Exploring the WiFi Pineapple
  • Learning objectives
  • 9.1 Understanding Bluetooth Vulnerabilities
  • 9.2 Surveying Tools for Bluetooth Monitoring
  • Learning objectives
  • 10.1 Understanding NFC Vulnerabilities
  • 10.2 Exploring NFC Attacks and Case Studies
  • Learning objectives
  • 11.1 Understanding the Evolution of Wireless Defenses
  • 11.2 Surveying Fast and Secure Roaming
  • 11.3 Understanding Wireless Intrusion Monitoring and Prevention
  • 11.4 Understanding Wireless Security Policies
  • Learning objectives
  • 12.1 Understanding IoT Fundamentals
  • 12.2 Exploring ZigBee and IEEE 802.15.4
  • 12.3 Exploring INSTEON
  • 12.4 Exploring ZWave
  • 12.5 Exploring LoRA
  • Learning objectives
  • 13.1 Understanding OWASP Mobile Device Vulnerabilities
  • 13.2 Wrestling with the BYOD Dilemma
  • 13.3 Understanding Mobile Device Management (MDM)
  • 13.4 Understanding Mobile Device Security Policies
  • Learning objectives
  • 14.1 Exploring The Android Security Model
  • 14.2 Exploring Android Emulators and SDK
  • 14.3 Understanding Android Hacking Tools and Methodologies
  • Learning objectives
  • 15.1 Introducing iOS Security
  • 15.2 Exploring Jailbraking iOS
  • 15.3 Surveying Tools for Dissasembling iOS Applications
  • Wireless Networks, IoT, and Mobile Devices Hacking: Summary

DON'T HAVE TIME?

We can send you everything you need to know about this course through email.
We respect your privacy. Your information is safe and will never be shared.