Ethical Hacking

  1. Wireless Network Security
    1. Wireless Networking Fundamentals
      1. IEEE 802.11 Standards
        1. 802.11 Legacy
          1. 802.11a/b/g
            1. 802.11n (Wi-Fi 4)
              1. 802.11ac (Wi-Fi 5)
                1. 802.11ax (Wi-Fi 6)
                2. Wireless Network Components
                  1. Access Points
                    1. Wireless Controllers
                      1. Wireless Clients
                        1. Antennas and RF Components
                        2. Wireless Network Topologies
                          1. Infrastructure Mode
                            1. Ad-Hoc Mode
                              1. Mesh Networks
                                1. Wireless Distribution System
                                2. Radio Frequency Concepts
                                  1. Frequency Bands
                                    1. Channel Allocation
                                      1. Signal Propagation
                                        1. Interference and Noise
                                      2. Wireless Security Protocols
                                        1. Wired Equivalent Privacy
                                          1. WEP Encryption Process
                                            1. WEP Key Management
                                              1. WEP Vulnerabilities
                                                1. IV Collision Attacks
                                                  1. Weak Key Attacks
                                                    1. Authentication Bypass
                                                  2. Wi-Fi Protected Access
                                                    1. WPA Implementation
                                                      1. TKIP Encryption
                                                        1. WPA Vulnerabilities
                                                          1. TKIP Attacks
                                                            1. WPA-PSK Attacks
                                                          2. WPA2 Security
                                                            1. AES-CCMP Encryption
                                                              1. 4-Way Handshake Process
                                                                1. WPA2-Personal
                                                                  1. Pre-Shared Key Authentication
                                                                    1. PSK Vulnerabilities
                                                                    2. WPA2-Enterprise
                                                                      1. 802.1X Authentication
                                                                        1. EAP Methods
                                                                          1. RADIUS Integration
                                                                        2. WPA3 Enhancements
                                                                          1. Simultaneous Authentication of Equals
                                                                            1. Enhanced Open
                                                                              1. WPA3-Personal Improvements
                                                                                1. WPA3-Enterprise Features
                                                                              2. Wireless Attack Techniques
                                                                                1. Wireless Network Discovery
                                                                                  1. Passive Scanning
                                                                                    1. Active Scanning
                                                                                      1. Hidden SSID Detection
                                                                                        1. Wireless Site Surveys
                                                                                        2. Wireless Encryption Attacks
                                                                                          1. WEP Cracking Techniques
                                                                                            1. FMS Attack
                                                                                              1. Korek Attack
                                                                                                1. PTW Attack
                                                                                                2. WPA/WPA2 Attacks
                                                                                                  1. Handshake Capture
                                                                                                    1. Dictionary Attacks
                                                                                                      1. Brute Force Attacks
                                                                                                        1. PMKID Attacks
                                                                                                        2. WPS Attacks
                                                                                                          1. WPS PIN Brute Force
                                                                                                            1. Pixie Dust Attack
                                                                                                              1. WPS Offline Attack
                                                                                                            2. Wireless Infrastructure Attacks
                                                                                                              1. Rogue Access Points
                                                                                                                1. Evil Twin Attacks
                                                                                                                  1. Captive Portal Attacks
                                                                                                                    1. Credential Harvesting
                                                                                                                    2. Access Point Exploitation
                                                                                                                      1. Default Credential Attacks
                                                                                                                        1. Firmware Vulnerabilities
                                                                                                                          1. Configuration Weaknesses
                                                                                                                        2. Wireless Client Attacks
                                                                                                                          1. Deauthentication Attacks
                                                                                                                            1. Client Disconnection
                                                                                                                              1. Handshake Forcing
                                                                                                                              2. Disassociation Attacks
                                                                                                                                1. Man-in-the-Middle Attacks
                                                                                                                                  1. ARP Spoofing over Wireless
                                                                                                                                    1. DNS Spoofing
                                                                                                                                      1. SSL Stripping
                                                                                                                                    2. Advanced Wireless Attacks
                                                                                                                                      1. Karma Attacks
                                                                                                                                        1. Caffe Latte Attack
                                                                                                                                          1. Hirte Attack
                                                                                                                                            1. Fragmentation Attacks
                                                                                                                                          2. Wireless Security Assessment
                                                                                                                                            1. Wireless Penetration Testing Methodology
                                                                                                                                              1. Planning and Preparation
                                                                                                                                                1. Information Gathering
                                                                                                                                                  1. Vulnerability Assessment
                                                                                                                                                    1. Exploitation
                                                                                                                                                      1. Post-Exploitation
                                                                                                                                                        1. Reporting
                                                                                                                                                        2. Wireless Security Controls
                                                                                                                                                          1. Network Segmentation
                                                                                                                                                            1. MAC Address Filtering
                                                                                                                                                              1. Wireless Intrusion Detection
                                                                                                                                                                1. Wireless Intrusion Prevention
                                                                                                                                                                2. Enterprise Wireless Security
                                                                                                                                                                  1. Network Access Control
                                                                                                                                                                    1. Certificate-Based Authentication
                                                                                                                                                                      1. Wireless Policy Development
                                                                                                                                                                        1. Wireless Security Monitoring