WiFi Penetration Testing
A tailor-made course for professional red teamers looking to extend their abilities into the world of Wi-Fi.
80 Hours
Red Team
80 Hours
Red Team


The widespread access to Wi-Fi at public, private and personal levels make this technology a common entry point to organizations which are usually less monitored or protected due to lack of knowledge or weaker security measures integral to protecting the network.
By completing our hands-on course, our trainees will gain a clear, practical understanding of the many weaknesses in Wi-Fi and other wireless protocols and how to apply that understanding to modern wireless systems. Along with exploiting access points, trainees will learn how different system react or behave during Wi-Fi attacks.

The course covers the following topics:


It’s important to improve the accordion’s behaviour

Basic of WiFi Communications
  • Understanding the Wi-Fi threats

  • Capturing wi-Fi communications

  • Access points analysis

WiFi Exploitation Techniques
  • HotSpot hacking
  • Client side attacks
  • WEP exploitation
  • DoS attacks
  • Wi-Fi Fuzzing
Enterprise Attacks, DECT and Zigbee
  • Exploiting the Pre-Shared keys
  • Exploiting WPA2
  • Zigbee Deployments
Bluetooth Attacks
  • Bluetooth Exploitation techniques
  • Low Energy Bluetooth attacks
  • Intro to SDR (Software defined Radio)
RFID and NFC Hacking
  • RFID Overview
  • RFID privacy attacks
  • Low frequency RFID attacks
  • Exploiting RFID Cards
  • NFC Intro
  • NFC exploits
Don't touch this tab

About CYBERPRO was founded in cooperation with international information security and instruction authorities who bring to Israel world-leading cyber training technologies and a learning experience of the highest standard available today.

The partners include the IITC group which has been training graduates for the high tech industry for over 20 years, and was selected as the training center for the Cisco Company in Israel.

CYBERPRO’s advanced, sought-after training courses in the areas of infrastructures, information security and cyber are world famous. These training courses were developed by some of the best cyber experts in the world, for international security organizations that emphasize the high training capabilities, the professional learning methods and the unique training and practice technologies. Our connection with international groups allows our students to be exposed to unique employment opportunities in Israel and abroad.

The training and learning tracks are all based much hands-on practice and preparation for the industry and profession requirements, so they include technological labs and practice sessions using one of the most advanced simulators in the world.

    • TBD
    • Deep understanding of networking
    • Familiarity with operating systems
    • Experience in penetration testing and exploits techniques
    • TBD