Network Security & Pentesting

Network Security & Pentesting

11 October 2014 — 02 November 2014

ICT Courses
Special Focus

In the last decade, wireless networks gained a substantial momentum. One of the most beneficial features of wireless networks is that they support user mobility in a convenient way. The downside is that wireless networks are more susceptible to attacks than their wired counterparts. This increased vulnerability mainly stems from the lack of physical connections and the broadcast nature of radio communications. It is, therefore, important to provide appropriate security measures for wireless networks, which ensure the robustness of their operation even in case of malicious attack. Security has been considered an important issue in WiFi networks from the beginning. Consequently, early versions of the IEEE 802.11 wireless LAN standard [802.1Q1] have already featured a security architecture, which is called WEP (Wired Equivalent Privacy). As its name indicates, the objective of WEP is to render wireless LANs at least as secure as wired LANs (without particular security extensions)

Technology is no longer judged by its technical brilliance, but by the return on investment (both tangible and intangible). This in turn, is dictated by the killer application for that technology. Wireless Networks fit into this because the technology has been around long enough and can provide enough benefits to be seriously considered for deployment. At the enterprise, it provides communication support for mobile computing. It overcomes and, in fact, annihilates the physical limitation of wired networks in terms of adaptability to a variation in demand. Network connectivity in a company’s meeting room is a classic example. The number of users using that room would vary for different meetings Mobility is another feature by wireless. Mobile users can be truly mobile, in that they don’t need to be bound to their seats when connecting to the network. Mobility, however is not only associated with users, it’s also associated with the infrastructure itself.

This training course is part of the six-month program:



Price 150.00 Eur
Application deadline October 10, 2014 at 5pm
(This course has ended)

Course Details


☆  Keywords

WiFi, WLAN, WEP, 802.11, 802.11i, WPA, WPA2, RSN, 802.1X, EAP, RADIUS, TKIP, RC4, CCMP, AES, authentication, access control, integrity, confidentiality.

☆  Prerequisites

This course is ideal for penetration testers, security enthusiasts and network administrators.

☆  Modules

1. Bypassing WLAN Authentication

2. Cracking WLAN Encryption

3. Attacking the WLAN Infrastructure

4. Advanced Enterprise Attacks

5. Attacking the Wireless Client

6. Breaking into the Client

7. Enterprise

☆  1. Bypassing WLAN Authentication

Shared Key,
MAC Filtering,
Hidden SSIDs

☆  2. Cracking WLAN Encryption

WEP,
WPA/WPA2 Personal and Enterprise,
Understanding encryption based flaws (WEP,TKIP,CCMP)

☆  3. Attacking the WLAN Infrastructure

Rogues Devices, Evil Twins,
DoS Attacks,
MITM,
Wi-Fi Protected Setup

☆  4. Advanced Enterprise Attacks

802.1x,
EAP,
LEAP,
PEAP,
EAP-TTLS

☆  5. Attacking the Wireless Client

Honeypots and Hotspot attacks,
Caffe-Latte, Hirte,
Ad-Hoc Networks and Viral SSIDs,
WiFishing

☆  6. Breaking into the Client

Metasploit,
SET, Social Engineering

☆  7. Enterprise

Wi-Fi Worms,
Backdoors and Botnets

☆  Instructor Profile | Drinor Selmanaj

Drinor Selmanaj has experience in cyber security. He has been working with FLOSSK for 2 years now he is one of many contributors in Kosovo in many open source projects, he has been doing workshops around Kosovo in data security, also being a FLOSSKie he has been maintaining the network of the SFK (Software Freedom Kosova) the annual conference about open source in Kosovo. His expertise are networks and computer security. While on workdays he is the CEO of HelloWorld, a company which is focused on application development. His passion about computer security and networks never stops. He will be showing some awesome stuff at advanced cyber security training.

☆  The Schedule | Duration

24 hours

Saturday & Sunday starting 17:00 - 20:00

October 11 - November 2, 2014

☆  Contact Information

Innivation Centre Kosovo; Rexhep Mala str. 28A, 10000, Prishtina

training@ickosovo.com; 048 765 567




Network Security & Pentesting

Drinor Selmanaj

Instructor

Drinor Selmanaj is a lecturer, entrepreneur and information security specialist from Kosovo.
He has spent his years consulting, auditing, and hardening IT-infrastructures in companies and organizations across the region.
As a lecturer, he has established a Penetration Testing programme at ICK which seeks to hone the skills of young technology enthusiasts looking into entering the field of cybersecurity.
His entrepreneurial spirit led him to found a software development company called “Hello World!” centered around creating secure and highly functional digital products for local companies and businesses.
He is the CTO and co-founder of “Sentry L.L.C” - one of the first companies in Kosovo to regionally offer products and an extensive list of services in information security.
As a citizen of Kosovo and a member of various hacker communities, Drinor is able to see both the needs of legitimate businesses as well as the needs of a darker digital underground.






BOLD

© ICK — Innovation Centre Kosovo