WiFi Penetration Testing
A tailor-made course for professional red teamers looking to extend their abilities into the world of Wi-Fi.
80 Hours
Red Team
80 Hours
Red Team


The widespread access to Wi-Fi at public, private and personal levels make this technology a common entry point to organizations which are usually less monitored or protected due to lack of knowledge or weaker security measures integral to protecting the network.
By completing our hands-on course, our trainees will gain a clear, practical understanding of the many weaknesses in Wi-Fi and other wireless protocols and how to apply that understanding to modern wireless systems. Along with exploiting access points, trainees will learn how different system react or behave during Wi-Fi attacks.

The course covers the following topics:


It’s important to improve the accordion’s behaviour

Basic of WiFi Communications
  • Understanding the Wi-Fi threats

  • Capturing wi-Fi communications

  • Access points analysis

WiFi Exploitation Techniques
  • HotSpot hacking
  • Client side attacks
  • WEP exploitation
  • DoS attacks
  • Wi-Fi Fuzzing
Enterprise Attacks, DECT and Zigbee
  • Exploiting the Pre-Shared keys
  • Exploiting WPA2
  • Zigbee Deployments
Bluetooth Attacks
  • Bluetooth Exploitation techniques
  • Low Energy Bluetooth attacks
  • Intro to SDR (Software defined Radio)
RFID and NFC Hacking
  • RFID Overview
  • RFID privacy attacks
  • Low frequency RFID attacks
  • Exploiting RFID Cards
  • NFC Intro
  • NFC exploits
Don't touch this tab

SOTERIA Global is a global leader in cyber-security training solutions and services.

The cyber world is now a part of our everyday life. New technology emerges daily, and as opportunities increase, so do cyber risks. Threats constantly evolve, and we must protect our valuable assets.

A successful cyber defense has many factors, but they all have one thing in common: dedicated, skilled individuals.

SOTERIA Global experts develop our solutions and rely on the best technological assets in the market. Our impressive global presence expands over four continents, giving us access to the best cybersecurity professionals.

Our solutions range from customized training programs to developing cyber-oriented facilities, ensuring that individuals and organizations are ready to face real-world threats. Over the years, we have worked with various organizations across many sectors, giving us the skillset to shape and adapt our solutions to meet our client’s needs.

    • TBD
    • Deep understanding of networking
    • Familiarity with operating systems
    • Experience in penetration testing and exploits techniques
    • TBD