Professional Documents
Culture Documents
In
fact, not only is wireless here to stay, but it is growing in deployment and utilization with wireless
LAN technology and WiFi as well as with other applications, including cordless telephones, smart
homes, embedded devices, and more. Technologies like ZigBee and Z-Wave offer new methods of
connectivity to devices, while other wireless technology, including WiFi, Bluetooth, Bluetooth Low
Energy, and DECT continue their massive growth rate, each introducing their own set of security
challenges and attacker opportunities.
Using assessment and analysis techniques, this course will show you how to identify the threats that
expose wireless technology and build on this knowledge to implement defensive techniques that can
be used to protect wireless systems.
Author Statement
It's been amazing to watch the progression of wireless technology over the past several years. WiFi
has grown in maturity and offers strong authentication and encryption options to protect networks,
and many organizations have migrated to this technology. At the same time, attackers are becoming
more sophisticated, and we've seen significant system breaches netting millions of payment cards
that start with a wireless exploit. This pattern has me very concerned, as many organizations, even
after deploying WPA2 and related technology, remain vulnerable to a number of attacks that expose
their systems and internal networks.
With the tremendous success of WiFi, other wireless protocols have also emerged to satisfy the
needs of longer-distance wireless systems (WiMAX), lightweight embedded device connectivity
(ZigBee and IEEE 802.15.4), and specialty interference-resilient connectivity (Bluetooth and DECT).
Today, it's not enough to be a WiFi expert; you also need to be able to evaluate the threat of other
standards-based and proprietary wireless technologies as well.
In putting this class together, I wanted to help organizations recognize the multi-faceted wireless
threat landscape and evaluate their exposure through ethical hacking techniques. Moreover, I
wanted my students to learn critical security analysis skills so that, while we focus on evaluating
wireless systems, the vulnerabilities and attacks we leverage to exploit these systems can be
applied to future technologies as well. In this manner, the skills you build in this class remain
valuable for today's wireless technology, tomorrow's technology advancements, and for other
complex systems you have to evaluate in the future as well.
- Joshua Wright
Additional Resources
Take your learning beyond the classroom. Explore our site network for additional resources related
to this course's subject matter.