Learn your way! Get started

Certified Ethical Hacker, Part 7 of 8: Wireless Networks and Firewalls

with expert Rafiq Wayani


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 3/23/2016
Level Intermediate
Runtime 1h 44m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Much as mobile platforms have changed society as a whole, they have also radically altered the battlespace between hackers and the security professionals dedicated to stopping them. In this session, Rafiq Wayani will discuss how hackers are using wireless networks to attack and evade traditional security tools, intrusion detection systems, firewalls, and honeypots. This course is part of a series covering EC-Council's Certified Ethical Hacker (CEH).

Prerequisites

To get the most out of this course, this course assumes that you have a good working knowledge of Linux and Windows based networking environments. It also assumes that you have experience with managing a network, have worked with networking hardware such as switches & routers, are familiar with MS Active Directory (AD) Domain based authentication, know how to work with command-line utilities, and understand the basics of Web Server environments. Many of the demonstrations in this course use the Windows 7 and Kali Linux operating systems which can be downloaded free from the respective sites. All of the demonstrations are created in a virtual environment using Oracle VirtualBox and VMware vSphere 6.

Learning Paths

This course will help you prepare for the following certification and exam:
Certified Ethical Hacker
312-50: Certified Ethical Hacker

Meet the expert

Rafiq Wayani has extensive experience including more than 20 years in IT as Systems Architect, Software Engineer, DBA, and Project Manager. Wayani has instructed in a variety of technical areas, has designed and implemented network and information systems, and is certified across a wide range of platforms and systems including Microsoft Solutions Developer, Systems Engineer, Application Developer, Database Administrator, Trainer; Novell Netware Administrator and Engineer; Master Certified Netware Engineer; and A Certified.

Course outline



Wireless Networking

Wireless Networking Concepts (05:35)
  • Introduction (00:23)
  • Wireless Networking Concepts (02:35)
  • Directional Antennae (00:28)
  • Wireless Networking Concepts (01:24)
  • Omnidirectional Antennae (00:29)
  • Summary (00:13)
Wireless Encryption (06:59)
  • Introduction (00:19)
  • Wireless Encryption (03:20)
  • Demo: WPA2 (03:10)
  • Summary (00:09)
Wireless Threats (09:53)
  • Introduction (00:19)
  • Wireless Threats (02:14)
  • Rogue APs (00:57)
  • Wireless Threats (06:11)
  • Summary (00:11)
Wireless Hacking Methodology (08:55)
  • Introduction (00:19)
  • Wireless Hacking Methodology (01:51)
  • Wifite (03:20)
  • Wireless Hacking Methodology (01:08)
  • Wifiphisher (02:02)
  • Summary (00:12)
Wireless Bluetooth Hacking (07:22)
  • Introduction (00:18)
  • Bluetooth: Basics (02:24)
  • Bluetooth Hacking (01:07)
  • Bluetooth Security (02:45)
  • Bluetooth Hacking Tools (00:35)
  • Summary (00:11)
Wireless Countermeasures (08:06)
  • Introduction (00:19)
  • Wireless Countermeasures (00:35)
  • Demo: CIRT.net Passwords (03:33)
  • Wireless Countermeasures (00:27)
  • Demo: Linksys Settings (03:02)
  • Summary (00:08)

IDS & Firewall

IDS, Firewalls, and Honeypots (08:35)
  • Introduction (00:24)
  • Intrusion Detection System (02:46)
  • Network-Based IDS (01:06)
  • Host-Based IDS (01:31)
  • Intrusion Detection Techniques (02:31)
  • Summary (00:15)
Evading IDS (06:25)
  • Introduction (00:17)
  • Evading IDS (03:44)
  • IDS Diagram (02:11)
  • Summary (00:11)
Evading Firewalls (15:04)
  • Introduction (00:24)
  • Types of Firewalls (03:40)
  • Firewall Diagram (05:47)
  • Evading Firewalls (00:10)
  • Spoofing Diagram (01:22)
  • Evading Firewalls (00:13)
  • Source Routing Diagram (00:26)
  • Evading Firewalls (02:47)
  • Summary (00:11)
Evading Firewall Tools (11:26)
  • Introduction (00:24)
  • Evading Firewall Methods (01:42)
  • Demo: Loki (02:05)
  • HTTP Tunneling Diagram (01:08)
  • Evading Firewall Tools (00:15)
  • Demo: Traffic IQ Professional (00:12)
  • Evading Firewall Tools (03:11)
  • Demo: Evading Firewall Tools (00:43)
  • Your Freedom Diagram (00:35)
  • Demo: More Evading Tools (00:53)
  • Summary (00:11)
Detecting Honeypots (02:56)
  • Introduction (00:15)
  • Detecting Honeypots (01:41)
  • Detecting Honeypots Cont. (00:45)
  • Summary (00:13)
IDS Evasion Countermeasures (04:34)
  • Introduction (00:21)
  • Attacker Creativity (02:02)
  • Network Monitor (00:00)
  • Insertion (00:56)
  • Attacker Creativity (00:57)
  • Summary (00:15)
IDS Penetration Testing (08:06)
  • Introduction (00:17)
  • IDS/Firewall Pen Testing (03:38)
  • Penetration Tesing Cont. (03:48)
  • Summary (00:22)