Wireless networks are popping up everywhere. It will be the most commonly used technology among computer networks in the near future. They provide a lot of freedom but not without cost: Too many home and corporate wireless networks are left wide open for attack.
This course takes an in-depth look at the security challenges of many different wireless technologies, exposing you to wireless security threats through the eyes of an attacker. Using readily available and custom-developed tools, you’ll navigate your way through the techniques which are used by the attackers to exploit WiFi networks, including attacks against WEP, WPA/WPA2, PEAP, TTLS, and other systems.
Using assessment and analysis techniques, this course will show you how to identify the threats that expose wireless technology and build on this knowledge to implement defensive techniques that can be used to protect wireless systems.