Certified Wireless Security Engineer (CWSE) – Outline

Gedetailleerde cursusinhoud

  • Course Introduction
  • Module 01 - Business and Technical Logistics of Wireless Pen Testing Section 01 - What is Penetration Testing? Section 02 - Today’s Threats Section 03 - Pen Testing Methodology Section 04 - Wireless Standards and Organizations
  • Module 02 - Wireless Security Fundamentals Section 01 - Wireless Security Fundamentals Section 02 - WLAN Security Policy Section 03 - RF Components Section 04 - RF Signal and Antenna Concepts Section 05 - Spread Spectrum Technologies Section 06 - IEE 802.11 Standards Section 07 - IEEE 802.15 Standards Bluetooth
  • Module 03 - Authentication Section 01 - WLAN Authentication Overview Section 02 - 802.1x Section 03 - EAP Section 04 - Key Management
  • Module 04 - Encryption Section 01 - Cryptography Overview Section 02 - Symmetric Encryption Section 03 - Asymmetric Cryptography Module 05 - WLAN Encryption Implementations Section 01 - WPA2 Section 02 - WPA3 Section 03 - Sniffing Section 04 - Authentication Attacks Section 05 - Threat Assessments
  • Module 07 - Reconnaissance and Enumeration Section 01 - What are we looking for? Section 02 - Keeping Track of what we find! Section 03 - Where/How do we find this information? Section 04 - Passive Scanning: Are there tools to help? Section 05 - Passive Recon Countermeasures Section 06 - Reaching Out! Section 07 - Port Scanning Section 08 - Active Scanning: Are there tools to help? Section 09 - Active Recon Countermeasures Section 10 - Banner Grabbing Section 11 - Enumeration
  • Module 08 - Network Assessment and Exploitation Techniques Section 01 - Exploits Section 02 - WiFi Tools Section 03 - Wi-Fi Exploits Section 04 - Exploit Framework
  • Module 09 - Evasion Techniques Section 01 - Evading Firewalls Section 02 - Evading Honeypots Section 03 - Evading IDS
  • Module 10 - Monitoring and Auditing WLANS Section 01 - Monitoring Section 02 - Auditing Section 03 - Secure Roaming Section 04 - WLAN Security Recommendations and Designs 
  • CYBER RANGE - WIRELESS LABS
  • Lab 01 - Introduction to Pen Testing Setup
  • Lab 02 - Using Tools for Reporting (Optional)
  • Lab 03 - Wireless Authentication Capture
  • Lab 04 - Information Gathering (Optional)
  • Lab 05 - Detecting Live Systems - Scanning Techniques
  • Lab 06 - Enumeration
  • Lab 07 - Wireless Scanning with Different Systems
  • Lab 08 - Decrypting Wi-Fi Traffic
  • Lab 09 - Cracking WPA2
  • Lab 10 - Windows System Hacking
  • Lab 11 - Advanced Vulnerability and Exploitation Techniques
  • Lab 12 - AntiVirus Bypass
  • Lab 13 - Cracking Passwords from a Linux System
  • Lab 14 - Network Sniffing/IDS
  • Lab 15 - WiFi Audit with hcxdumptool Final Lab - WarDrive, Scanning, Setup Evil Twin, Enterprise Attack