Wireless Security

Wireless computing devices are everywhere and new products seem to appear daily, which poses significant security risks to an organization. As a result, network and information security staff must understand the risks inherent in wireless computing. This course is intended for professionals who support, design or assess IEEE 802.11 wireless environments, commonly known as Wi-Fi.

Hands-on activities are presented from the attacker’s perspective to help learners understand a wireless attacker’s methodology. The course will present a variety of case studies, accompanied by numerous lab exercises to reinforce wireless security concepts and materials.

Learning Objectives

After completing this course, learners should be able to:

  • Find and access wireless access points using free tools
  • Identify “cloaked” or non-broadcasting access points
  • Defeat common security features
  • Explore brute force attacks against WPA/WPA2-PMK
  • Forcefully disassociate a client from an access point
  • Adopt best practices on how to defeat WEP encryption
  • Understand how attackers use wireless access points as an initial entry point during a network security breach
  • Recognize common attack vectors used after accessing a wireless network
  • Discuss common misconceptions about wireless technologies and why it can be nearly impossible to locate an attacker

Who Should Attend

Information technology, information security and corporate investigative team members, as well as other staff members who need to perform security audits on their wireless infrastructures.


A basic understanding of TCP/IP networks and proficiency with Linux systems. Familiarity with computer security terminology and concepts is also recommended.

What to Bring

On-site requirements vary based on client environment. Contact course coordinator for specific equipment requirements.


2 days

Instructor-Led Training Instructor-Led Training

Courses cannot be purchased or accessed from this site.

If you would like to register for this course, please contact your FireEye account manager.

Thank you.