Wireless networks provide many new opportunities in convenience … and exploitation. Two videos take you through the fundamentals of attacking wireless networks, beginning with a close look at Wi-Fi authentication and the weak points at each stage of the process. We examine the cracks in Wired Equivalency Privacy (WEP) and its successors, Wi-Fi Protected Access (WPA) and WPA2, as well as the tools and techniques used to break into them. An overview and comparison of key security mobile security device features introduces you to malware for mobile devices, rooting and jailbreaking, the dangers of Bring-Your-Own-Device (BYOD) policies and potential legal concerns for both the company and the pentester.
Attacking Wireless NetworksDuration: 13:02
Mobile DevicesDuration: 8:56
Meet the author
At Infosec, we believe knowledge is the most powerful tool in the fight against cybercrime. We help IT and security professionals advance their careers with a full regimen of certification and skills training. We also empower all employees with security awareness training to stay cybersecure at work and home. Driven by smart people wanting to do good, Infosec educates entire organizations on how to defend themselves from cybercrime. That’s what we do every day — equipping everyone with the latest security skills so the good guys win.
You're in good company
"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had."
"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."
"I’ve taken five boot camps with Infosec and all my instructors have been great."