Certified Ethical Hacker (CEH) v8: Hacking Wireless Networks

This course is included in our On-demand training solution.


Wireless networks pose unique security challenges and any wireless strategy must have security as a central requirement. In this course we look at hacking wireless networks, the associated tools and techniques used, and mitigation strategies. This course is the thirteenth in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.

Target Audience

Network and information security professionals



Expected Duration

90 min.

Course Objectives

Wireless Networking Overview

  • identify wireless security standards
  • Wi-Fi Encryption and Attacks

  • match the type of wireless attack to an example
  • Wireless Hacking Methodology: Discovery and Analysis

  • identify wireless hacking discovery and analysis tools
  • Wireless Hacking Methodology: Cracking Encryption

  • identify types of wireless hacking attacks
  • Wireless Hacking Tools

  • identify types of Bluetooth attacks
  • Countermeasures, Tools, and Penetration Testing

  • recognize the characteristics of wireless IPS tools
  • Wireless Network Hacking





    Multi-license discounts available for Annual and Monthly subscriptions.