Ethical hacking - wireless networks
How do attackers break Wi-Fi security and get data from it?
We will show you that in the course.
We will teach you to think like a hacker
You'll learn the basics of breaking Wi-Fi security from the ground up. We will show you how a hacker thinks and how to be one step ahead of him.
The course uses a practical approach (only 10% of theory and 90% of practice), so that you take home as much as possible and try everything for yourself.
You will immediately use the acquired knowledge to secure your own networks, systems, etc.
In the course you will learn in practice:
- The course is focused on practical hacking and security of WEP / WPA / WPA2 Wi-Fi networks using Kali Linux.
Course content:
-
Setting up Kali Linux
-
Selection of software and hardware for ethical hacking
-
Basics of network security and how Wi-Fi networks communicate
-
Wi-Fi security methods
-
Risks of unencrypted (open) networks
-
Obtaining information before the attack itself
-
Hacking WEP / WPA / WPA2 networks
-
You will try everything practically
The most important part of the course:
-
MITM attacks - how to get information about connected devices in the network, how to control them, how to get passwords, etc.
-
Protect Wi-Fi from similar attacks
Advantages of our courses:
The course is led by an experienced penetration tester with years of practice
Small groups with an individual approach
Practical lessons, you will try everything for yourself
Our lecturers participate in regular trainings and competitions
You will learn current procedures and news
There will be plenty of time for your questions
Who is the course for?
Anyone who wants to learn ethical hacking can come to the course.
The course will use the following to deepen your knowledge or to improve security in the company in practice:
- Ethical hacker or penetration tester
- Security manager
- Network administrator
- Computer science students
What knowledge is required?
- Knowledge of Windows and Linux operating systems
- Basic orientation in security issues in TCP / IP networks
How does the course work?
The course lasts 3 days, always from 9 am to 4 pm with an hour break for lunch.
You will be provided with:
-
Coffee, water, tea, lunch and snacks,
-
WIFI connection,
-
pad and pen.
At the end of the course, you will receive a graduate certificate and a complete presentation in PDF.
What do you need with you?
Own laptop with charger
The training takes place in our training facilities at the address: Dukelských Hrdinů 564/34, Prague 7, 170 00
How much does the course cost?
What do the participants say about the course?
“I have learned how to scan and attack from the outside, I appreciated the recapitulation of the tools”
"I've been introduced to new vulnerability testing tools."
"I've spread awareness of where and how 'bad guys' may try to attack."
"The course complements my experience and helps me design and implement security solutions for customers."
"I gained basic information, an overview and a basis for practice. The practical exercises were great. "