Course Summary
The Evergreen Alliance training program for the GIAC Assessing and Auditing Wireless Networks (GAWN) certification is tailored for professionals who need to evaluate the security of wireless networks. The certification emphasizes various wireless network security mechanisms, tools and techniques for identifying and exploiting vulnerabilities, and methods for analyzing wireless networks. Participants will gain a comprehensive understanding of how these tools work and the weaknesses in the protocols they examine.
Key topics covered include:
Attacking weak encryption, 802.11 fuzzing attacks, and Bluetooth vulnerabilities
Bridging air gaps, Denial of Service (DoS) on wireless networks, high-frequency RFID attacks, and RFID applications
Hotspot security, low-frequency RFID attacks, NFC, practical SDR attacks, and rogue networks
Wireless sniffing, wireless fundamentals, client attacks, WPA security, and Zigbee vulnerabilities
Fuzzing Attacks
The candidate will be capable of executing basic fuzzing attacks on wireless networks.
Attacking Weak Encryption
The candidate will be knowledgeable about weak encryption methods such as WEP, and how to exploit and secure these vulnerabilities.
Bluetooth Attacks
The candidate will understand the structure, use cases, and security weaknesses of Bluetooth technology.
Bluetooth Low Energy Attacks
The candidate will demonstrate an understanding of how changes in Bluetooth Low Energy (BLE) impact security, and will be able to test, inspect, and audit BLE data in transit.
Bridging the Air Gap
The candidate will be able to leverage a compromised wireless system to gain unauthorized access to a wired network.
DoS on Wireless Networks
The candidate will be able to perform and defend against common Denial of Service (DoS) attacks on wireless networks.
High-Frequency RFID Attacks
The candidate will understand RFID tracking techniques and how to exploit mid- to long-range RFID applications.
Hotspots
The candidate will be familiar with identifying and auditing public hotspots for security vulnerabilities.
Low-Frequency RFID Attacks
The candidate will demonstrate expertise in short-range, Low-Frequency (LF) RFID attacks, including impersonation and cloning of LF RFID tags.
NFC
The candidate will have an understanding of Near Field Communication (NFC) technology, its data protocols, and its use in payment systems and data transfers.
Practical SDR Attacks
The candidate will be familiar with common wireless protocol implementations and how Software Defined Radio (SDR) projects can help identify failures in those protocols.
Rogue Networks
The candidate will understand how to detect and defend against rogue networks posing security threats.
Sniffing Wireless
The candidate will be skilled in capturing wireless traffic for analysis.
Wireless Basics
The candidate will be familiar with common wireless security threats and the current standards for wireless networks.
Wireless Client Attacks
The candidate will understand vulnerabilities specific to wireless clients, including hotspot injection, weaknesses in client segmentation, and issues with preferred network lists on client devices.
WPA Variants
The candidate will be knowledgeable about WPA variants and how to attack and secure them.
Zigbee
The candidate will be familiar with Zigbee technology, including how to attack and secure Zigbee networks.
Other Popular Courses
CompTIA: SecurityX
- Duration: 5 Days
- Language: English
- Level: Advanced
- Exam: CAS-005
Executive Cyber Risk Certification (ECRC)
- Duration: 2 Days
- Language: English
- Level: Advanced
- Exam: ECRC
Mastering Communication & Presentation Te...
- Duration: 5 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT