Ataques a Redes Inalámbricas. Métodos …

Attack on wireless networks. Wifi penetration methods
  • Understand the basic concepts in  computer security such  as:  WEBWPASSID  or  LAN .
  • Address the wireless connection process   and general Wi-fi security procedure  .
  • Get a  global vision of security management.
  • Learn about  wireless footprinting:  equipment, software and wireless mapping.
  • Know the different  threats  and  vulnerabilities  to  networks : loss of confidentiality, availability, attacks on users, etc.
  • Analyze  attacks on WI – FI networks : WEP AND WAP AND WAP2.
Unit 1.  Introduction and previous concepts to WIFI penetration methods.
  1. Wireless LAN.
  2. Evolution of Wireless LANs: An Overview.
  3. A basic wireless LAN.
  4. Basic architecture of a wireless LAN.
  5. Wireless LAN settings.
  6. Service distribution systems (DSSS).
  7. Existing wireless lan standards.
  8. Do wireless LANs have health risks?
  9. Security risks.
  10. History of the IEEE.
  11. IEEE 802 wireless standards.
  12. The 802.11 family of standards.
  13. The details of the 802.11 standard.
  14. 802.11 security.
  15. Operating modes.
  16. The extensions 802.11.
  17. Disadvantages of 802.11.
  18. Comparison of wireless standards.
Unit 2.  Structural study parameters and topology of Wireless Networks.
  1. Wireless networks.
  2. Security of wireless access points.
  3. SSID.
  4. Conducting a site survey.
  5. Use of secure encryption protocols.
  6. The antenna.
  7. Power and portals.
  8. Network security.
  9. Wireless communications and security.
  10. Authentication protocols.
  11. Understand the needs of wireless LAN.
  12. Carrying out the survey on the site.
  13. Configuration of requirements and expectations.
  14. Hardware and wireless LAN hardware estimation software required.
Topic 3.  WIFI wireless equipment to use and carry out traces on possible victims.
  1. Wireless footprinting.
  2. Wireless scanning and enumeration.
  3. Identifying pollutant and wireless network defenses.
Unit 4.  Attack phase to a wireless network.
  1. Analytical introduction and optimization of results.
  2. Different threats and vulnerabilities to networks.
  3. Attacks on WI-FI networks: WEP AND WAP AND WAP2.
  4. Attacks and service problems on the network.
  5. Intrusion attacks: cloud service problems.
  6. Forgery of identities.
  7. Intrusion software.
  8. Security politics.

Especificaciones de curso

Modalidad: Online


Solicitar información


Ataques a Redes Inalámbricas. Métodos …