Wireless Attacks and Countermeasures

This course is included in our On-demand training solution.


Wireless networking is becoming more and more prevalent in corporate networks. The methods used to set up and secure these networks are often tested by hackers to see if they can penetrate and gain information from them. This course examines wireless systems and 802.11x WLAN operational modes. This course discusses WEP and other wireless security protocols, along with WLAN threats, wireless hacking tools, and the security countermeasures that can be used to counter these threats. This course also assists students who are preparing for the EC Council’s Ethical Hacking and Countermeasures (CEHv6) exam 312-50.

Target Audience

Existing or in-training IT security professionals seeking detailed security penetration testing skills


A technical background with a solid understanding of networks and networking concepts, such as TCP/IP, IP Routing, and LAN Switching, as well as Windows and/or UNIX/LINUX operating systems; a general familiarity with the principles and usage of command-line, coding, and GUI-based technologies for manipulating IT operating systems

Expected Duration

120 min.

Course Objectives

Cellular Phone Networks

  • recognize features of the primary modes used for cellular communication
  • Wireless LAN RF Technologies and Bluetooth

  • recognize features of the RF technologies for 2.4 Ghz wireless LANs
  • identify the components of Bluetooth security algorithms
  • 802.11x and Authentication Protocols

  • sequence the steps of the association process
  • 802.11x and Bluetooth Security

    WEP and WPA

  • recognize features of the WEP authentication methods
  • identify the vulnerabilities of WEP
  • WLAN Threats and Wireless Hacking Tools

  • recognize how wireless networks are vulnerable to DoS attacks
  • recognize how the broadcast bubble makes wireless networks vulnerable to eavesdropping
  • recognize common wireless hacking tools
  • Securing Wireless Systems

  • recognize how to increase the security of wireless LANs
  • Countering Wireless Network Attacks