header-logo.png TIC CIU

Wireless & Web Penetration Testing

Course Description

Network Penetration Testing course for beginners taking you from wondering what hackers do to setting up a lab, learning Kali Linux, and conducting your own network penetration testing!.

Would you like to learn what hackers do to setting up a lab, learn Kali Linux and conduct your own penetration testing because this will help you level up your cyber security and ethical hacking career?

What you'll learn


Introduction To Wireless Administration

Wireless Networking is one of the fastest-growing technologies in both consumer and business arenas today. 
It’s become the primary means of communication for mobile users on the go, and allows us all to watch movies, 
listen to music, surf the web, and even conduct business from small mobile devices such as cell phones, PDAs, 
and laptops. This title, by veteran VTC author Bobby Rogers, delivers a solid foundation on these technologies 
to the up-and-coming wireless administrator. Both newcomers and experienced administrators will gain insight on 
administering both basic and complex wireless networks. To begin learning simply click the links.

INTRODUCTION & COURSE OUTLINE
 	 	
	Course Introduction & Outline
 	
OVERVIEW OF WIRELESS NETWORKING
 	 	
	Overview of Wireless Networking
 	 	
	Wireless Vs Wired Networks
 	 	
	Wireless Basics
 	 	
	Wireless Transmission Methods
 	 	
	Wireless Hardware Overview
 	 	
	Wireless Security Issues
 	
WIRELESS STANDARDS & TOPOLOGIES
 	 	
	Introduction to Wireless Standards & Topologies
 	 	
	802.11a
 	 	
	802.11b
 	 	
	802.11g
 	 	
	802.11n
 	 	
	802.11i
 	 	
	Other Standards
 	 	
	Wireless Topologies
 	
WIRELESS TECHNOLOGY SCIENCE FUNDAMENTALS
 	 	
	Waves/Frequency & Amplitude
 	 	
	RF Wave Concepts
 	 	
	RF Power
 	 	
	Range & Speed
 	
WIRELESS HARDWARE
 	 	
	Wireless Access Points
 	 	
	Wireless Network Hardware
 	 	
	Wireless Client Hardware
 	 	
	Antennas
 	 	
	Boosters & other Wireless Hardware
 	
CONFIGURING WIRELESS ACCESS POINTS
 	 	
	Access Point General Configuration
 	 	
	Configuring a Linksys AP
 	 	
	Configuring a TrendNet AP Pt.1
 	 	
	Configuring a TrendNet AP Pt.2
 	 	
	Configuring a DLink AP
 	 	
	Configuring a Linux AP
 	 	
	Troubleshooting Wireless Access Points Pt.1
 	 	
	Troubleshooting Wireless Access Points Pt.2
 	
CONFIGURING WIRELESS CLIENTS
 	 	
	General Client Configuration
 	 	
	Configuring a Windows Client
 	 	
	Configuring a Windows XP Client
 	 	
	Configuring a Windows Vista Client
 	 	
	Configuring a Linux Client
 	 	
	Configuring a Mac OS X Client
 	
WIRELESS APPLICATIONS
 	 	
	Introduction to Wireless Applications
 	 	
	Wireless Markup Language
 	 	
	Wireless Application Protocol
 	 	
	Wireless Enabled Web
 	
WIRELESS SECURITY PROTOCOLS & FEATURES
 	 	
	WEP
 	 	
	WPA/WPA2/802.11i
 	 	
	802.1x/EAP-TLS/PEAP/LEAP
 	 	
	SSID Protection
 	 	
	MAC Address Filtering
 	
WIRELESS PERIPHERALS
 	 	
	Wireless Print Servers
 	 	
	Wireless Media Centers
 	 	
	Other Wireless Peripherals
 	
BLUETOOTH
 	 	
	Overview of Bluetooth
 	 	
	Bluetooth Security Features
 	 	
	Bluetooth Weaknesses
 	
OTHER WIRELESS TECHNOLOGIES
 	 	
	Infra Red Technologies
 	 	
	Cell Phone Technologies
 	 	
	Connecting with Wireless PDAs
 	 	
	RFID
 	 	
	ZigBee
 	
WIRELESS SECURITY TESTING
 	 	
	War Driving & War Chalking
 	 	
	Penetration Testing Methodology
 	 	
	Pen Testing Platforms
 	 	
	Pen Testing Tools
 	 	
	Netstumbler Demonstration
 	 	
	Rouge Access Points & Illegal Clients
 	
ADMINISTERING A WIRELESS NETWORK
 	 	
	Site Survey & Design
 	 	
	Home Networks
 	 	
	Small & Medium Networks Pt.1
 	 	
	Small & Medium Networks Pt.2
 	 	
	Enterprise Wireless Networks
 	
BEST PRACTICES
 	 	
	Best Practices - Designing the Network Pt.1
 	 	
	Best Practices - Designing the Network Pt.2
 	 	
	Best Practices - Wireless Clients
 	 	
	Best Practices - Wireless Access Points
 	 	
	Connecting Wireless & Wired Networks
 	 	
	Best Practices - Wireless Security

Requirements

  • No prerequisites. Basics are covered

  • Anyone who wants to make career in Network Security domain

Technology Incubation Center CIU

ticlogo.png
  • 4.8 Institution Rating
  • 11,613 Likes
  • 125,745 Students
  • 35 Courses

About Technology Incubation Center CIU

Technology Incubation Center CIU since inception in 2002, is committed to introducing new courses and certification programs pertinent to industry standard, which currently boasts a large pool of certified professionals benefitting more than 1,20,000 successful participants. TIC CIU's certified candidates that have become the most sought after professionals serving reputed corporates and government organisations like CISCO, Microsoft, TCS, Infosys, Dell, IBM, GM, Wipro, HCL, HP ... and the list grows crossing more than 1000 companies which have trusted our trained and certified professionals to become their valued assets.