Wi-Fi Testing and Principles_

How attackers bypass Wi-Fi security and extract data from it

What you’ll get to try out in practice during the course:

  • Practical cracking of WEP/WPA/WPA2 networks.
  • Methods for securing Wi-Fi networks.
  • Gathering information prior to the actual attack.
  • Choosing the right software and hardware for ethical hacking.
  • MITM attacks — how to identify devices on a network, take control of them, and obtain login credentials.
  • The basics of network security and the principles of Wi-Fi network communication.
  • The dangers of unencrypted (open) networks.
  • Practical Wi-Fi Attacks and Security Using Kali Linux.
  • Installing and configuring Kali Linux.
  • You’ll get to try everything out in real-life exercises.

Who is this course intended for?

This course is designed for those who want to enhance their skills or improve security within their organization:

  • Network Administrators
  • Ethical hackers and penetration testers
  • Computer science students
  • Security Managers

Requirements

Basic understanding of IT issues.
No prior experience with Linux or programming is required.


Course outline:

The course lasts 1 day
from 9:00 a.m. to 4:00 p.m., with a one-hour lunch break.

The following will be available during the training:
Wi-Fi connection
Coffee, tea, water, lunch, and light snacks
Notebook and pen
Upon completion of the course, you will receive a certificate of completion.