Wireless Computer Network Exploitation provides a structured exploration of modern wireless technologies and their security implications. This course equips students with the knowledge and skills needed to evaluate, test, and exploit wireless technologies in support of cyber operations. Over five days, students examine the foundations of RF communication, dissect 802.11 protocols, and assess weaknesses in Wi-Fi security standards. The course emphasizes applied analysis and exploitation of wireless devices and access points, including IoT systems. Students finish with a comprehensive Culmination Exercise that validates their ability to conduct reconnaissance, execute attacks, and assess risk in wireless environments.
Intended Audience: Cyber operators, penetration testers, and red team personnel who require foundational-to-intermediate proficiency in wireless reconnaissance, exploitation, and credential capture. Participants should have a basic understanding of networking concepts and offensive security fundamentals and be prepared to apply wireless attack techniques in controlled lab environments.