RCCE Course
Course #232

Wireless testing Threats and Detection

📊 Level: Intermediate
⏱️ Duration: 2 Days
🏷️ Track: Offensive Security
📋 Prerequisites: Foundations
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn wireless penetration testing methodologies including wireless reconnaissance, network discovery, encryption cracking, client-side attacks, and post-exploitation in wireless environments. RCCE students will learn to use tools for wireless scanning and enumeration, capture WPA handshakes, perform dictionary and brute-force attacks against wireless credentials, execute man-in-the-middle attacks on wireless networks, test captive portal security, assess Bluetooth and IoT wireless protocol security, and document wireless vulnerability findings in professional penetration test reports. This threat-focused course teaches students to think like adversaries while building robust defenses. Building on core knowledge, RCCE students will learn to analyze attack techniques, build detection logic, and implement defensive strategies that proactively identify threats before they cause damage. Students develop a threat-informed mindset that drives better security decisions across all operational activities.

🎯 Target Audience
  • Security Engineers building defensive controls
  • Security Analysts and Blue Team members
  • Systems Administrators with security responsibilities
  • GRC and Risk Professionals supporting controls
  • Professionals implementing Wireless testing Threats and Detection
🧠 What You Will Learn
  • Execute hands-on tasks for wireless testing
  • Build detections and response workflows for privilege escalation
  • Explain Course Overview fundamentals
  • Execute hands-on tasks for what you will learn
  • Execute hands-on tasks for skills you will build — covering Wireless penetration testing methodologies, Wireless scanning and enumeration.
  • Execute hands-on tasks for threat-informed mindset — covering Think like adversaries to build robust defenses.
  • Execute hands-on tasks for wireless fundamentals: 802.11 standards
  • Design a scalable privilege management architecture with policy and enforcement
  • Execute hands-on tasks for infrastructure mode — covering Centralized AP management via controller.
  • Execute hands-on tasks for ad-hoc / mesh mode — covering Peer-to-peer without central AP.
  • Execute hands-on tasks for wireless security protocols
  • Execute hands-on tasks for wireless threat landscape
📚 Course Outline
Module 01Wireless Testing
Module 02Threats and Detection
Module 03Course Overview
Module 04What You Will Learn
Module 05Skills You Will Build
Module 06Threat-Informed Mindset
Module 07Wireless Fundamentals: 802.11 Standards
Module 08Wireless Network Architecture
Module 09Infrastructure Mode
Module 10Ad-Hoc / Mesh Mode
Module 11Wireless Security Protocols
Module 12Wireless Threat Landscape
Module 13Network-Level Threats
Module 14Client-Level Threats
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice wireless testing threats and detection by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Execute hands-on tasks for wireless testing
  • Lab 2: Build detections and response workflows for privilege escalation
  • Lab 3: Explain Course Overview fundamentals
  • Lab 4: Execute hands-on tasks for what you will learn
  • Lab 5: Execute hands-on tasks for skills you will build
📊 Skill Level
Intermediate
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Wireless testing Threats and Detection, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI