We're offering 20% off September Live Online classes! See which courses are applicable.   |   Details

AccountIcon BigDataIcon BlogIcon default_resource_icon CartIcon checkmark_icon cloud_devops_icon computer_network_admin_icon cyber_security_icon gsa_schedule_icon human_resources_icon location_icon phone_icon plus_icon programming_software_icon project_management_icon redhat_linux_icon search_icon sonography_icon sql_database_icon webinar_icon

Search UMBC Training Centers


Wireless Analysis & Exploitation (WAX)

Group Training + View more dates & times


The Wireless Analysis and Exploitation (WAX) course maps to the objectives of the Ultimate Hacking-Wireless course. WAX is a specialized course that focuses on 802.11 wireless technologies. This course introduces students to radio frequency fundamentals, standards-based protocols and network deployments as it applies to IEEE 802.11 wireless networks (WLAN). Students will develop an understanding of wireless network components, architecture, and security. This knowledge will be leveraged to better understand and undertake wireless network exploitation. Students will recognize how their efforts will tie back into the hacker methodologies. This course will ensure students understand and apply the topics through numerous hands-on labs and exercises. Students will be able to survey for and identify wireless networks, operating and security parameters, and connected devices. Surveys and network captures are used to identify and research possible vulnerabilities and, ultimately, try to exploit the present vulnerabilities.

Who Should Take This Course


Previous TCP/IP networking training or Network+ course or equivalent experience is required. Experience working from Windows and Linux/UNIX command line interface is highly recommended.

Why You Should Take This Course


Upon completion of this course, the student will be able to:

  • Understand radio frequency fundamentals
  • Identify 802.11 wireless network components and topologies
  • Identify wireless network operating parameters and characteristics
  • Examine cryptographic security network information
  • Identify security threats, risks, and attacks
  • Understand how WLAN defenses are implemented
  • Integrate wireless operations into the hacker methodology
  • Conduct wireless network survey captures
  • Enumerate valuable wireless network information
  • Exploit wireless networks
  • Conduct post wireless network exploitation and information gathering
Course Outline


Day 1 – RF Fundamentals, Math, and Antenna Concepts, WLAN Components and Topologies

Day 2 – WLAN Client Devices and Access Points, Medium Access Control (MAC), MAC Architecture, Dynamic Cryptographic Keys and Robust Security Networks

Day 3 – Security Risks and Threats, Wireless Security Monitoring and Defense, WLAN Auditing, Equipment Selection

Day 4 – Methodologies, Scanning, Enumeration, Geospatial Integration

Day 5 – Key Recovery, Gaining Access, Advancing Inward, Sniffing and Traffic Analysis


  1. Introduction to radio frequency (RF) fundamentals
    1. Understand RF characteristics and behaviors
    2. Identify RF communication components
    3. Identify unit of power and comparison
    4. Perform RF math calculations
  1. Understand RF signal and antenna components
    1. Interpret antenna charts
    2. Identify antenna types
    3. Understand lines of sight
    4. Calculate Fresnel zones and minimum antenna heights
    5. Consider appropriate antenna selection, connectors, and installation
  1. Identify WLAN components and topologies
    1. Differentiate between wireless topologies
    2. Identify the major WLAN and 802.11 components
    3. Select the appropriate 802.11 configuration modes
    4. Identify WLAN client and access point devices
    5. Distinguish between various WLAN architectures
  2. Identify wireless network operating parameters and characteristics
    1. Understand carrier sense multiple access with collision avoidance
    2. State the different implementation of coordination functions
    3. Distinguish between virtual and physical carrier sense mechanisms
    4. Identify the 802.11 frame types and the information contained therein
  1. Examine cryptographic security network information
    1. Understand dynamic key generation
    2. Interpret robust secure network information
    3. State the security key hierarchy
    4. Identify cryptographic key generation information exchange between stations
  1. Identify security threats, risks, and attack
    1. Explain the risk of rogue devices
    2. Conduct passive and active eavesdropping
    3. Describe attacks at layers one and two
    4. Identify more advanced wireless attacks
  1. Understand how WLAN defenses are implemented
    1. Differentiate between wireless intrusion detection and prevention systems
    2. Describe the types of detection and prevention deployment solutions
    3. State how rogue wireless devices are mitigated and located
    4. Identify layer one and two auditing and tools
  1. Integrate wireless operations into the hacker methodology
    1. State the steps in the hacker methodology
    2. Identify where wireless scanning and exploitation fit in the methodology
  2. Conduct wireless network survey captures
    1. State the difference between monitor, managed, and master modes
    2. Choose the right wireless network equipment for your operations
    3. Perform passive discovery and active scanning of wireless networks
  1. Enumerate valuable wireless network information
    1. Identify key information in network probes and responses
    2. Conduct research for published vulnerabilities and exploits
    3. Integrate geolocation data into network surveys captures
    4. Research captured location information
    5. Create visual products from wireless network captures
  2. Exploit wireless networks
    1. Capture critical information to aid in security key recovery
    2. Crack security keys
    3. Exploit Wi-Fi protected setup vulnerabilities
    4. Use recovered security keys to gain access to a wireless network
    1. Conduct post wireless network exploitation and information gathering
      1. Sniff sensitive wireless network traffic
      2. Employ a network protocol analyzer
      3. Extract unencrypted authentication credentials
      4. Extract objects from network data streams
Is there a discount available for current students?

UMBC students and alumni, as well as students who have previously taken a public training course with UMBC Training Centers are eligible for a 10% discount, capped at $250. Please provide a copy of your UMBC student ID or an unofficial transcript or the name of the UMBC Training Centers course you have completed. Asynchronous courses are excluded from this offer.

What is the cancellation and refund policy?

Student will receive a refund of paid registration fees only if UMBC Training Centers receives a notice of cancellation at least 10 business days prior to the class start date for classes or the exam date for exams.

Contact Us