Ultimate Hacking: Wireless

Learn the tools, techniques, and methods hackers use to target wireless networks

Next Steps:

Overview

Upcoming Course Dates & Locations: View Schedule

Type of Course: Classroom

Mission-critical data, secrets, and other company information transmitted into the air cause hackers everywhere to rejoice. Wireless networks bring unique challenges to those tasked with their defense. How confident are you that your wireless infrastructure can withstand the latest attacks by the world’s cleverest hackers? Do vendors’ claims tell the whole story? Where is your Achilles’ heel?

Beyond the authorized wireless infrastructure you know exists in your organization, what about the wireless networks that aren’t supposed to be there? Do you know when an onsite vendor or consulting company tucked away in a forgotten conference room plugs in their mobile access point? What about that temporary access point in a QA lab that is still there months later?

What about the wireless clients themselves? Laptops, smart phones, printers, VoIP phones, HVAC systems, and even the remote controls in your executive boardrooms are all using wireless technologies. Organizations may have a secured wireless infrastructure but find themselves in trouble when these untamed devices are coaxed into connecting to a clever hacker’s fake access point. Untamed devices connected into your company’s Ethernet and seeking extended service set identifiers (ESSIDs) like linksys are creating a bridge for attackers to get onto your internal network.

Foundstone’s internationally renowned Ultimate Hacking: Hands On series goes wireless to help you see your wireless networks the way hackers view them. Learn the tools, techniques, and methods attackers use against you in order to develop an effective defense against an increasingly sophisticated onslaught.

Knowledge is power and you do not want the hackers to know more about your wireless networks than you do.

What You'll Learn

Foundstone consultants and instructors bring real-world experience to the classroom to empower you with the skills to assess your security posture and implement effective countermeasures. Foundstone experts bring their consulting experience of breaking into real enterprise wireless networks and share their methodologies in the classroom.

Key topics are supported by hands-on exercises and labs specifically designed to increase knowledge retention. This course will take you from theoretical knowledge to the all-important ability to “do it,” instead of just talk about it.

Picking the right equipment and configuring a purpose-built wireless attack operating system can be a daunting task for individuals who are new to wireless technologies. It can take days to properly configure attack systems and figure out which of the many free attack tools work well and which ones just don’t get the job done.

Every Ultimate Hacking: Wireless Networks student will leave the classroom with the right attack equipment and hands-on experience using many different wireless tools.

Why We Teach This Course

Sun Tzu said it best in the “Art of War”: “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.”

Ignorance is anything but bliss when it comes to defense. The enemy already knows you. How well do you know them?

Who Teaches this Course

Uniquely qualified to present this material, Foundstone consultants have performed hundreds of security assessments for Fortune 500 companies. These expert instructors have exceptional professional backgrounds, including experience at Big Five consulting firms, government agencies, the Air Force Information Warfare Center, and on Wall Street. Members of the instructor team authored the best-selling “Hacking Exposed: Network Security Secrets & Solutions.” They are also invited speakers at industry conferences such as Interop, USENIX, and the Black Hat Briefings.

Who Should Take this Course

This course is for anyone responsible for the planning, implementation, maintenance, or assessment of wireless networks.

Continuing Education Credits

This course qualifies for up to 24 hours of continuing professional education (CPE) credits for Certified Information Systems Security Professional (CISSP)/Systems Security Certified Practitioner (SSCP), and 21 hours of CPE credits for Certified Information Systems Auditor (CISA)/Certified Information Security Manager (CISM) holders.