Skip to Content
Wireless Networks, IoT, and Mobile Devices Hacking (The Art of Hacking Series)
on-demand course

Wireless Networks, IoT, and Mobile Devices Hacking (The Art of Hacking Series)

with Omar Santos
February 2018
Intermediate
5h 12m
English
Cisco Press
Closed Captioning available in English, Japanese, Korean, Chinese (Simplified), Chinese (Traditional)

Overview

More Than 5 Hours of Video Instruction

More than 5 hours of video instruction to help you learn the skills necessary to perform advanced penetration testing of wireless networks and Internet of Things (IoT) devices.

Overview
Wireless Networks, IoT, and Mobile Devices Hacking provides step-by-step real-life, advanced scenarios of performing security assessments (penetration testing) of wireless networks and how to perform security posture assessments of Internet of Things (IoT) technologies and solutions. You also learn how to perform security posture assessments of mobile devices, such as smartphones, tablets, and wearables.

Get step-by-step guidance so you can learn ethical hacking, penetration testing, and security posture assessment. You also learn the various concepts associated with many different leading-edge offensive security skills in the industry. Full of multimedia tutorials and hands-on demos that users can apply to real-world scenarios, this is a must for anyone interested in pursuing an ethical hacking career.

Resources: This is part of The Art of Hacking Series. Other titles in this series are: Security Penetration Testing The Art of Hacking Series LiveLessons
https://www.safaribooksonline.com/library/view/security-penetration-testing/9780134833989/

Topics include

  • Introduction to wireless technologies and protocols
  • Wireless infrastructure attacks
  • Wireless client attacks
  • Building your lab and attack hardware
  • Aircrack-ng
  • Cracking WEP
  • Hacking WPA
  • Performing wireless reconnaissance
  • Evil twins and rogue access points
  • Bluetooth security assessment and monitoring
  • NFC security assessment
  • Wireless defenses
  • Performing security assessments of IoT devices
  • Mobile device security
  • Hacking Android devices
  • Hacking iOS devices

About the Instructor

Omar Santos is an active member of the cybersecurity community, where he leads several industry-wide initiatives and standards bodies. He is a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), where he mentors and leads engineers and incident managers during the investigation and resolution of cybersecurity vulnerabilities. He is the author of several cybersecurity books and video courses.

Learn How To

  • Build your own wireless hacking labs and know what type of hardware you can use to perform wireless hacking
  • Use several open-source tools, such as Aircrack-ng
  • Crack WEP and examine different attacks against WPA
  • Perform wireless reconnaissance
  • Perform evil twin attacks, creating rogue access points
  • Performing security assessments of Bluetooth and NFC implementations
Who Should Take This Course
  • Any network and security professional who is starting a career in ethical hacking and penetration testing
  • Individuals preparing for the CompTIA PenTest+, the Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), and any other ethical hacking certification
  • Any cybersecurity professional who wants to learn the skills required to becoming a professional ethical hacker or who wants to learn more about general security penetration testing methodologies and concepts.
Course Requirements
Requires basic knowledge of networking and cybersecurity concepts and technologies.

Lesson descriptions
Lesson 1 reviews the different wireless standards and technologies, including the 802.11 standard, Bluetooth, and NFC, and covers what 802.1x is and the different wireless authentication mechanisms that exist in the industry.

Lesson 2 reviews different wireless client attacks and what motivates threat actors to launch these attacks against their victims.

Lesson 3 goes over several tips on how to build a lab, reviewing different types of wireless antennas and wireless hacking devices, such as the pineapple.

Lesson 4 discusses the Aircrack-ng suite of tools. These tools include Airmon, Airodump, Aireplay, Airdecap, Airserv, and Airtun.

Lesson 5 introduces Wired Equivalent Privacy (WEP) and then examines how to hack it or crack it and obtain the password of a wireless device running WEP.

Lesson 6 demonstrates the fundamentals of the WPA version 1 and version 2 protocols and discusses the different attacks against WPA2-PSK networks.

Lesson 7 shows how to use tools like CAPR, CPG, Kismet, and GISKismet to perform wireless reconnaissance.

Lesson 8 introduces evil twin attacks and then teaches how to perform those types of attacks.

Lesson 9 starts by going over different examples of Bluetooth vulnerabilities and then covers different tools for Bluetooth hacking.

Lesson 10 reviews several examples of NFC vulnerabilities and covers different attacks against NFC implementations.

Lesson 11 covers the evolution of wireless defenses along with details about fast and secure roaming. It also discusses wireless intrusion monitoring and prevention.

Lesson 12 starts with the fundamentals of IoT technologies and reviews how to perform security assessments of IoT protocols and implementations like ZigBee, INSTEON, ZWave, and LoRA.

Lesson 13 explores the different mobile device vulnerabilities that are categorized by OWASP.

Lesson 14 starts by going over the Android security model and then explores different Android emulators and software development kits (SDKs).

Lesson 15 introduces Apple iOS security, how to jailbreak iOS devices, and how to disassemble iOS applications.

About Pearson Video Training
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Watch now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things

The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things

Aditya Gupta

Publisher Resources

ISBN: 9780134854632