Featured resource
pluralsight tech forecast
2025 Tech Forecast

Which technologies will dominate in 2025? And what skills do you need to keep up?

Check it out
Hamburger Icon
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Specialized Attacks: Wireless

This course will teach you to identify the vectors and techniques used by threat actors to gain access to networks and systems via wireless technologies.

Matthew Lloyd Davies - Pluralsight course - Specialized Attacks: Wireless
by Matthew Lloyd Davies

What you'll learn

Wireless systems are ubiquitous in society and so they are a prime target for exploitation by cyber criminals and hostile states. Threat actors target wireless networks to gain an initial foothold in a network, to steal information, or conduct ransomware attacks. In this course, Specialized Attacks: Wireless, you’ll learn to exploit weaknesses in wireless protocols, infrastructure, and client devices that are targeted by real-world threat actors. First, you’ll review various radio protocols to understand where they fit into the data-rate versus range spectrum, and how their implementation makes them susceptible to hacking. Next, you’ll look at specific techniques to target wireless protocols, infrastructure, and client devices to gain access to networks and assets, steal information, and deny access to systems. Finally, you’ll combine some of these techniques to create advanced attacks that are used by real-world threat actors to gain access to systems and networks. By the end of this course, you’ll be able to identify weaknesses in wireless assets and systems, and make recommendations to improve the security posture of an organization’s wireless network infrastructure.

Table of contents

About the author

Matthew Lloyd Davies - Pluralsight course - Specialized Attacks: Wireless
Matthew Lloyd Davies

Matt has a degree in Chemical engineering and a PhD in mathematical chemistry. He is also a GIAC certified incident handler and penetration tester and has regulated cyber security in the UK civil nuclear sector for many years.

More Courses by Matthew