SEC617: Wireless Penetration Testing and Ethical Hacking is designed for professionals seeking a comprehensive technical ability to understand, analyse, and defend the various wireless technologies that have become ubiquitous in our environments and, increasingly, key entrance points for attackers.


Learning Outcome

The authors of SEC617, as penetration testers themselves, know that many organisations overlook wireless security as an attack surface, therefore failing to establish required defences and monitoring even though wireless technologies are now commonplace in executive suites, financial departments, government offices, manufacturing production lines, retail networks, medical devices, and air traffic control systems.

Given the known risks of insecure wireless technologies and the attacks used against them, the course is designed to help people build the vital skills needed to identify, evaluate, assess, and defend against these threats. These skills are 'must-have' for any high-performing security organisation to prevent attacks and establish required defences.


Who should Attend?

  • Incident response team members and forensicators who are expanding their investigative scope from endpoint systems to the network
  • Hunt team members who proactively seek adversaries already in their network environments through leveraging new intelligence against previously-collected evidence
  • Law enforcement officers, federal agents, and detectives who want to become network forensic subject matter experts
  • Security Operations Center (SOC) personnel and information security practitioners who support hunt operations, seeking to identify attackers in their network environments
  • Network defenders who are taking on added investigative and/or incident response workloads
  • Information security managers who need to understand network forensics in order to manage risk, convey information security implications, and manage investigative teams
  • Network engineers who are proactively orienting their networks to best meet investigative requirements
  • Information technology professionals who want to learn how network investigations take place
  • Anyone who has a solid background in computer forensics, information systems, and information security and is interested in computer network intrusions and investigations 

Eligibility Criteria

To enrol in this course, participants needs to be in any of the following job roles:

  • Ethical hackers and penetration testers
  • Network security staff
  • Network and system administrators
  • Incident response teams
  • Information security policy decision-makers
  • Technical auditors
  • Information security consultants
  • Wireless system engineers
  • Embedded wireless system developers
This course is endorsed under Critical Infocomm Technology Resource Programme Plus (CITREP+) Programme.
To find out more about CITREP+ Funding, please refer to Programme Support under CITREP+ page

Information is accurate as of 30 December 2019