Knowledge and Understanding Successful students will typically …
Skills and Attributes Successful students will typically …
be able to write simple scripts to solve problems relevant to different aspects of operating systems and computer networks.
In this coursework, you will study and investigate one of the wireless network security threats using relevant mechanisms and tools. This should include literature review, practical experiments, setting up and configuring necessary tools such as Dagah to develop your security scenario. With Dagah, you can design attacks against targets, launch them, and review the security threats and testing results. Smartphone attacks can be simulated using various exploitations such as phishing, harvesting, iOS profile, and malicious application exploitation
You will only need to select one topic from the list below as follows:
You will use the penetration testing lifecycle to gather information through several means and sources for footprinting. This is to allow an ethical hacker to identify the target smartphone such as Android or iPhone App, give him/her a better understanding of the target’s mobile device and application services, plan its remote attack and create malicious app. To scan the wireless target systems for vulnerabilities identification and analysis you may use Airmon, Wireshark etc.