SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Cyber	
  51	
  LLC	
  	
  
267	
  Kentlands	
  Blvd.	
  #800,	
  Gaithersburg,	
  Maryland,	
  20878,	
  USA	
  
Email:	
  info@cyber51.com	
  	
  Phone:	
  (301)	
  830-­‐6702	
  
1 Day Wireless Penetration Testing
Wireless Networks make businesses more efficient and life easier. However, after Social Engineering
attacks, Wireless attacks are the second most popular way for attackers to break into networks and
steal information.
Who Should Attend?
The ultimate Wireless Hacking Day is a must for networking professionals, IT Managers, Penetration
Testers and anyone concerned with IT Security around Wireless Networking. Wireless and BYOD
enables productivity but introduces whole new attack vectors and attack surface.
Prerequisites
A working knowledge of TCP/IP, Linux and Windows.
VMware Player with a copy of Kali Linux
ALFA Networks AWUS036H USB 500mW or other card which supports injection
Objectives
This class is designed to give attendees an in-depth insight around Wireless Security and the
associated threats. Additionally delegates will gain the skills to effectively test the security of their
Wireless infrastructures and how to secure them appropriately.
Course Content
Brief recap on Wireless Basics
Cracking WEP encryption
Cracking WPS
Cracking WPA / WPA-2 PSK encryption incl. Dictionary attacks
Man in the Middle Attacks Overview
ARP and DNS spoofing in a Wireless cell
Rogue Access Points and Evil Twins
Wireless Denial of Service (DoS)
Bluetooth Hacking
Cyber	
  51	
  LLC	
  	
  
267	
  Kentlands	
  Blvd.	
  #800,	
  Gaithersburg,	
  Maryland,	
  20878,	
  USA	
  
Email:	
  info@cyber51.com	
  	
  Phone:	
  (301)	
  830-­‐6702	
  
Price:
$497.00 USD per delegate (scheduled) or $1,600.00 / day + T&E when delivered in-house
What will you learn?
See The World from a Hackers perspective
Learn Ethical Hacking
Get to Know The Tools Hackers use
Use that Knowledge to Secure Your Systems!
Start Or Enhance Your Career in IT Security
Earn respect amongst colleagues
Get trained by some of the best Consultants
Why Train with us?
We offer a unique Penetration Testing and Ethical Hacking Coaching program, which is very different
from anything else out there.
Your Benefits:
No death by PowerPoint slides => hands-on Ethical Hacking!
Small groups delegates per training to maximize time for questions
In-House option available for businesses. Contact us!
Instructors are some of the industry’s best Consultants, not just instructors.
Important Note: We will make every delegate sign an NDA & Confidentiality agreement prior to the
start of the training. This is necessary so that delegates to do not abuse the knowledge gathered in
our Ethical Hacking Training. Any knowledge acquired is intended to be used for legal purposes only
and you will be held fully responsible for any wrong-doing.
Please also note, that we may do a background check on delegates prior to attending and may share
delegate information with the US police and/or other US government bodies if requested.We also
reserve the right to decline delegates from attending with no reasons given, if we suspect the
delegate’s intention to be malicious. We are teaching people to become Ethical Hackers and not
Cyber Criminals.
Our Pentest Training is for study and education purposes only and we cannot be held responsible for
any damage caused by improper use of the tools and methods described. It is illegal in most countries
to perform penetration tests without a written prior agreement of the network/system owner. Hacking
carries severe penalties.

Más contenido relacionado

La actualidad más candente

Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamMohammed Adam
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1NetWatcher
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessStephen Cobb
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWPICPE
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider ThreatLancope, Inc.
 
Dealing with the insider threat.
Dealing with the insider threat.Dealing with the insider threat.
Dealing with the insider threat.Matt Lemon
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityA. Shamel
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider ThreatPECB
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineeringSweta Kumari Barnwal
 
Cybersecurity service provider
Cybersecurity service providerCybersecurity service provider
Cybersecurity service providerVishvendra Saini
 

La actualidad más candente (20)

Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed Adam
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider Threat
 
Dealing with the insider threat.
Dealing with the insider threat.Dealing with the insider threat.
Dealing with the insider threat.
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Cybersecurity service provider
Cybersecurity service providerCybersecurity service provider
Cybersecurity service provider
 
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering AttacksPACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
 

Destacado

Infographic: Penetration Testing - A Look into a Full Pen Test Campaign
Infographic: Penetration Testing - A Look into a Full Pen Test CampaignInfographic: Penetration Testing - A Look into a Full Pen Test Campaign
Infographic: Penetration Testing - A Look into a Full Pen Test CampaignPratum
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAdvantec Distribution
 
LokiPi: Small form factor wireless auditing and penetration testing toolkit
LokiPi: Small form factor wireless auditing and penetration testing toolkitLokiPi: Small form factor wireless auditing and penetration testing toolkit
LokiPi: Small form factor wireless auditing and penetration testing toolkitJonathan O'Brien
 
Networking & Security Ettercap
Networking & Security EttercapNetworking & Security Ettercap
Networking & Security EttercapNick Beattie
 
New School Man-in-the-Middle
New School Man-in-the-MiddleNew School Man-in-the-Middle
New School Man-in-the-MiddleTom Eston
 
Axoss Wireless Penetration Testing Services
Axoss Wireless Penetration Testing ServicesAxoss Wireless Penetration Testing Services
Axoss Wireless Penetration Testing ServicesBulent Buyukkahraman
 
Client side exploits
Client side exploitsClient side exploits
Client side exploitsnickyt8
 
MITM Attacks with Ettercap : TTU CyberEagles Club
MITM Attacks with Ettercap : TTU CyberEagles ClubMITM Attacks with Ettercap : TTU CyberEagles Club
MITM Attacks with Ettercap : TTU CyberEagles ClubShritesh Bhattarai
 
Ettercap
EttercapEttercap
EttercapTensor
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudyMohammad Mahmud Kabir
 
Penetration testing, What’s this?
Penetration testing, What’s this?Penetration testing, What’s this?
Penetration testing, What’s this?Dmitry Evteev
 

Destacado (13)

Infographic: Penetration Testing - A Look into a Full Pen Test Campaign
Infographic: Penetration Testing - A Look into a Full Pen Test CampaignInfographic: Penetration Testing - A Look into a Full Pen Test Campaign
Infographic: Penetration Testing - A Look into a Full Pen Test Campaign
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheet
 
LokiPi: Small form factor wireless auditing and penetration testing toolkit
LokiPi: Small form factor wireless auditing and penetration testing toolkitLokiPi: Small form factor wireless auditing and penetration testing toolkit
LokiPi: Small form factor wireless auditing and penetration testing toolkit
 
Networking & Security Ettercap
Networking & Security EttercapNetworking & Security Ettercap
Networking & Security Ettercap
 
New School Man-in-the-Middle
New School Man-in-the-MiddleNew School Man-in-the-Middle
New School Man-in-the-Middle
 
Axoss Wireless Penetration Testing Services
Axoss Wireless Penetration Testing ServicesAxoss Wireless Penetration Testing Services
Axoss Wireless Penetration Testing Services
 
Client side exploits
Client side exploitsClient side exploits
Client side exploits
 
MITM Attacks with Ettercap : TTU CyberEagles Club
MITM Attacks with Ettercap : TTU CyberEagles ClubMITM Attacks with Ettercap : TTU CyberEagles Club
MITM Attacks with Ettercap : TTU CyberEagles Club
 
The magic of ettercap
The magic of ettercapThe magic of ettercap
The magic of ettercap
 
Ettercap
EttercapEttercap
Ettercap
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case Study
 
Penetration testing, What’s this?
Penetration testing, What’s this?Penetration testing, What’s this?
Penetration testing, What’s this?
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 

Similar a 1 Day Wireless Penetration Testing Course

Top Network Security Interview Questions That You Should Know.pptx
Top Network Security Interview Questions That You Should Know.pptxTop Network Security Interview Questions That You Should Know.pptx
Top Network Security Interview Questions That You Should Know.pptxInfosectrain3
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetBVU
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..Sprintzeal
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxInfosectrain3
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)Wail Hassan
 
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptxCCNMumbai
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
Ethical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxEthical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxNarangYadav
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
 
Advanced Ethical hacking summer Internship in Delhi
Advanced Ethical hacking summer Internship in DelhiAdvanced Ethical hacking summer Internship in Delhi
Advanced Ethical hacking summer Internship in DelhiCRAW CYBER SECURITY PVT LTD
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration RecommendationsMeg Weber
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxinfosec train
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022Temok IT Services
 
5 Things You Should Know About Ethical Hacking
5 Things You Should Know About Ethical Hacking5 Things You Should Know About Ethical Hacking
5 Things You Should Know About Ethical HackingKoenig Solutions Ltd.
 
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...IT Network marcus evans
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxInfosectrain3
 

Similar a 1 Day Wireless Penetration Testing Course (20)

Brochure of ICSS
Brochure of ICSS Brochure of ICSS
Brochure of ICSS
 
CYBER51-FYLER
CYBER51-FYLERCYBER51-FYLER
CYBER51-FYLER
 
Top Network Security Interview Questions That You Should Know.pptx
Top Network Security Interview Questions That You Should Know.pptxTop Network Security Interview Questions That You Should Know.pptx
Top Network Security Interview Questions That You Should Know.pptx
 
20. CYBER51-1PAGE-FLYER-FEB15
20. CYBER51-1PAGE-FLYER-FEB1520. CYBER51-1PAGE-FLYER-FEB15
20. CYBER51-1PAGE-FLYER-FEB15
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)
 
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Ethical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxEthical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptx
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
Advanced Ethical hacking summer Internship in Delhi
Advanced Ethical hacking summer Internship in DelhiAdvanced Ethical hacking summer Internship in Delhi
Advanced Ethical hacking summer Internship in Delhi
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
5 Things You Should Know About Ethical Hacking
5 Things You Should Know About Ethical Hacking5 Things You Should Know About Ethical Hacking
5 Things You Should Know About Ethical Hacking
 
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptx
 

1 Day Wireless Penetration Testing Course

  • 1. Cyber  51  LLC     267  Kentlands  Blvd.  #800,  Gaithersburg,  Maryland,  20878,  USA   Email:  info@cyber51.com    Phone:  (301)  830-­‐6702   1 Day Wireless Penetration Testing Wireless Networks make businesses more efficient and life easier. However, after Social Engineering attacks, Wireless attacks are the second most popular way for attackers to break into networks and steal information. Who Should Attend? The ultimate Wireless Hacking Day is a must for networking professionals, IT Managers, Penetration Testers and anyone concerned with IT Security around Wireless Networking. Wireless and BYOD enables productivity but introduces whole new attack vectors and attack surface. Prerequisites A working knowledge of TCP/IP, Linux and Windows. VMware Player with a copy of Kali Linux ALFA Networks AWUS036H USB 500mW or other card which supports injection Objectives This class is designed to give attendees an in-depth insight around Wireless Security and the associated threats. Additionally delegates will gain the skills to effectively test the security of their Wireless infrastructures and how to secure them appropriately. Course Content Brief recap on Wireless Basics Cracking WEP encryption Cracking WPS Cracking WPA / WPA-2 PSK encryption incl. Dictionary attacks Man in the Middle Attacks Overview ARP and DNS spoofing in a Wireless cell Rogue Access Points and Evil Twins Wireless Denial of Service (DoS) Bluetooth Hacking
  • 2. Cyber  51  LLC     267  Kentlands  Blvd.  #800,  Gaithersburg,  Maryland,  20878,  USA   Email:  info@cyber51.com    Phone:  (301)  830-­‐6702   Price: $497.00 USD per delegate (scheduled) or $1,600.00 / day + T&E when delivered in-house What will you learn? See The World from a Hackers perspective Learn Ethical Hacking Get to Know The Tools Hackers use Use that Knowledge to Secure Your Systems! Start Or Enhance Your Career in IT Security Earn respect amongst colleagues Get trained by some of the best Consultants Why Train with us? We offer a unique Penetration Testing and Ethical Hacking Coaching program, which is very different from anything else out there. Your Benefits: No death by PowerPoint slides => hands-on Ethical Hacking! Small groups delegates per training to maximize time for questions In-House option available for businesses. Contact us! Instructors are some of the industry’s best Consultants, not just instructors. Important Note: We will make every delegate sign an NDA & Confidentiality agreement prior to the start of the training. This is necessary so that delegates to do not abuse the knowledge gathered in our Ethical Hacking Training. Any knowledge acquired is intended to be used for legal purposes only and you will be held fully responsible for any wrong-doing. Please also note, that we may do a background check on delegates prior to attending and may share delegate information with the US police and/or other US government bodies if requested.We also reserve the right to decline delegates from attending with no reasons given, if we suspect the delegate’s intention to be malicious. We are teaching people to become Ethical Hackers and not Cyber Criminals. Our Pentest Training is for study and education purposes only and we cannot be held responsible for any damage caused by improper use of the tools and methods described. It is illegal in most countries to perform penetration tests without a written prior agreement of the network/system owner. Hacking carries severe penalties.