Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. Offensive Security
  4. Wireless Attacks

Wireless Attacks

Wireless Attacks (PEN-210) introduces students to the skills needed to audit and secure wireless devices. It's a foundational course alongside PEN-200 and would benefit those who would like to gain more skill in network security. In PEN-210, students will learn to identify vulnerabilities in 802.11 networks and execute organized attacks. Each student will set up a home lab to practice the techniques learned in this online, self-paced course. Successful completion of the course and exam confers the Offensive Security Wireless Professional (OSWP) certification.

Course Overview

Overall Proficiency Level
2 - Intermediate
Course Catalog Number
PEN-210
Course Prerequisites

All students must have a solid understanding of TCP/IP and the OSI model, as well as familiarity with Linux. A modern laptop or desktop that can boot and run BackTrack and specific hardware is required to complete course exercises. You can use Kali Linux to take the course, but the exam uses BackTrack. Below is the recommended compatible hardware for your home labs. Recommended Wireless Network Routers D-Link DIR-601 Netgear WNR1000v2 Recommended Wireless Cards Netgear WN111v2 USB ALFA Networks AWUS036H USB 500mW For wireless card compatibility, please refer to the Aircrack-ng wiki

Training Purpose
Functional Development
Skill Development
Specific Audience
All
Delivery Method
Online, Self-Paced
  • Online, Self-Paced

Learning Objectives

Greater insight into wireless offensive security and expanded awareness of the need for real-world security solutions Implementing attacks against WEP and WPA encrypted network Executing advanced attacks such as PRGA key extraction and one-way packet injection Using alternate WEP and WPA cracking techniques Using various wireless reconnaissance tools Understanding of how to implement different rogue access point attacks Familiarity with the BackTrack wireless tools

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Vulnerability Assessment and Management

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: