Introduction to Certified Wireless Security Auditor™
2
Fundamentals of Wireless Network
3
Wireless Network SecurityPolicy
4
Wireless LAN Security Auditing
5
Wi-Fi Security Audit Methodology
6
Verifying Wi-Fi Security Audit Methodology
7
WLAN Configuration Security Audit
8
Infrastructure and Systems Security Audit
9
Study Material (Certified Information Security Executive)
Overview
Basics of Wireless Network
How to Install Kali Machine? (Part-1)
How to Install Kali Machine? (Part-2)
Update Kali Machine
Wireless Network Component and Security
Basics of Wireless Network Security
How to setup and configure the Metasploitable Server?
Find vulnerable ports with Nmap
Wireless Private Network
How to use Zenmap?
Wireless Network Security Design Issues
Discover All Host in the Network
Planning for Wireless Network Security
Trace all route in the network
Wireless LAN overview
Use case Study: Wireless Sniffing Tool Wireshark
Wireless LAN security
Use case Study: Wireless Sniffing Tool (Tcpdump)
Wireless Access Control Attacks
Use case Study: Wireless Sniffing Tool (Ettercap)
Wireless Security Assessment
Use case Study: Wireless Sniffing Tool (Driftnet)
Wi-Fi Architecture And Challenge
Use case Study: Wireless hacking
Wi-Fi Services
Basic Security Protocol
Use case Study: Wireless hacking
Wireless LAN services
Requirement of Compliance
Automate Everything in Wi-fi Hacking
ISO standards
Evil-Twin Attack
IT Infrastructure Audit Report
Linux Security Auditing
Slide Deck
Become a Certified Wireless Security Auditor today.