PEN-210 (Wireless Attacks) introduces the foundations of wireless network security, exploring common vulnerabilities and exploitation techniques. The course prepares learners in skills related to different types and architectures of Wi-Fi networks, wireless reconnaissance, and exploiting vulnerabilities in WPS.

 

PEN-210 teaches a range of wireless attack skills throughout the course, including:

  • Utilizing mac80211, the wireless framework included in all modern Linux kernels under which most common functions are standardized
  • Using Aircrack-ng, a suite of tools for wireless security assessment, including capturing packets, cracking passwords, and deauthenticating clients
  • Creating a rogue AP and look for devices trying to connect to a legitimate AP with the same name
  • Determining the chipset and driver for a Wi-Fi adapter, even if you can’t physically access the hardware itself
  • Capturing and decoding raw wireless frames with Kismet to identify access points and devices on the network

PEN-210 is constructed of 16 content modules, many with videos to assist learners in following along with the text. Upon completing PEN-210, learners will have mastered wireless security risk methodologies. Passing the accompanying exam to earn the OffSec Wireless Professional (OSWP) certification demonstrates a learner’s ability to identify and exploit vulnerabilities in 802.11 networks.

 

PEN-210 is ideal for penetration testers and security professionals seeking to expand their skill set to include wireless security policies and assessments. It has no formal prerequisites, though it’s strongly recommended that you have experience using the Linux command line, a solid understanding of TCP/IP networking, basic knowledge of wireless networking concepts (e.g., 802.11 protocols, encryption), and some familiarity with the standard skills of penetration testing.

Understand IEEE 802.11 standards and amendments
Describe various wireless network architectures and their components
Analyze Wi-Fi encryption methods and their vulnerabilities
Differentiate between packets and frames in the OSI model
Use tools like Wireshark to capture and analyze wireless frames
Perform wireless network attacks using tools such as Aircrack-ng and Kismet
Implement and detect rogue access points
Conduct attacks on WPA and WPA2 encrypted networks
Explore and exploit WPS vulnerabilities
Configure and secure wireless devices for ethical hacking

PEN-210 is ideal for:

  • Penetration Testers and Security Professionals seeking to expand their skillset to include wireless security policies and assessments
  • Individuals with a foundation in networking and basic familiarity with Linux command line

While there are no formal prerequisites, it’s strongly recommended that you have:

  • Comfort using the Linux command line
  • Solid understanding of TCP/IP networking
  • Basic knowledge of wireless networking concepts (e.g., 802.11 protocols, encryption

Up to 40 (ISC)² CPE credits