Reading Time: 2 minutes

SEC617: Wireless Penetration Testing and Ethical Hacking

This course is designed for professionals seeking a comprehensive technical ability to understand, analyze, and defend the various wireless technologies that have become ubiquitous in our environments and, increasingly, key entrance points for attackers.

What you’ll learn in SEC617: Wireless Penetration Testing and Ethical Hacking Are;

  1. NOW COVERING WIFI, ZIGBEE, Z-WAVE, DECT, RFID, AND SOFTWARE -DEFINED RADIO
  2. EXPLORE WIFI ATTACKS AGAINST WINDOWS, macOS, iOS, AND ANDROID
  3. EXAMINE BLE TECHNOLOGY WITH NEW INSIGHT, CERTIFYING DEVICES FOR USE
  4. LEARN TO ATTACK POPULAR WIRELESS TECHNOLOGY BEYOND WI-FI TARGETS
  5. ATTACK AND MANIPULATE RFID AND NFC SYSTEMS
  6. GAIN NEW INSIGHT INTO WIRELESS PROTOCOLS WITH SOFTWARE-DEFINED RADIO
  7. JUMPSTART YOUR TOOLKIT WITH SOFTWARE AND HARDWARE ASSESSMENT TOOLS SUPPLIED IN CLASS.

What Is Included In The Course;

Course Syllabus

  • SEC617.1: Wi-Fi Data Collection and Analysis
  • SEC617.2: Wi-Fi Attack and Exploitation Techniques
  • SEC617.3: Enterprise Wi-Fi, DECT, and Zigbee Attacks
  • SEC617.4: Bluetooth and Software Defined Radio Attacks
  • SEC617.5: RFID, Smart Cards, and NFC Hacking
  • SEC617.6: Hands-on Capture-the-Flag Event
Who Should Attend
  • Ethical hackers and penetration testers
  • Network security staff
  • Network and system administrators
  • Incident response teams
  • Information security policy decision-makers
  • Technical auditors
  • Information security consultants
  • Wireless system engineers
  • Embedded wireless system developers
You Will Be Able To
  • Identify and locate malicious rogue access points using free and low-cost tools
  • Conduct a penetration test against low-power wireless devices to identify control system and related wireless vulnerabilities
  • Identify vulnerabilities and bypass authentication mechanisms in Bluetooth networks
  • Utilize wireless capture tools to extract audio conversations and network traffic from DECT wireless phones
  • Implement a WPA2 Enterprise penetration test to exploit vulnerable wireless client systems for credential harvesting
  • Utilize Scapy to force custom packets to manipulate wireless networks in new ways, quickly building custom attack tools to meet specific penetration test requirements
  • Identify Wi-Fi attacks using network packet captures traces and freely available analysis tools
  • Identify and exploit shortcomings in the security of proximity key card systems
  • Decode proprietary radio signals using Software-Defined Radio
  • Mount a penetration test against numerous standards-based or proprietary wireless technologies
Links For Downloading SEC617: Wireless Penetration Testing and Ethical Hacking

Each Part Of the Link Contains Two Gigabyte Of Files In It.

SANS SEC 617 Documents 2020

SANS SEC 617 Voice 2020

SANS SEC 617 Videos 2020

The Password of Zip Files: www.netman24.ir 

Read Also: CBT Nuggets CCNA 200-301 2019 Download The Complete Tutorial