Provided by Offensive Security
Qualification level
Study type
Includes PDF Course Manual + 3.5 hours of Instructional Video + Certification Exam attempt.
$450.00 USD

About the course

Offensive Security Wireless Professional (OSWP)

Premier practical Wi-Fi attack certification in the security field

  • Earned after completing the 4-hour online exam
  • Pre-requisite Course: Offensive Security Wireless Attacks (WiFu)
  • Proves you have the practical ability to perform 802.11 wireless audits using open source tools
  • An OSWP is able to identify vulnerabilities in Wi-Fi networks and execute organized attacks in a controlled manner

Real World Exams

The OSWP examination requires the student to connect to our dedicated exam lab via SSH where they will encounter a number of wireless networks of varying configurations. The successful examinee will demonstrate their ability to identify the type of encryption in use on each network, any restrictions in place on each network, and proceed to recover the encryption key for each of them. The candidate is required to submit a comprehensive penetration test report, containing in-depth notes and screen shots detailing their findings, including the steps required to crack each wireless network.

Real World Benefits

An OSWP, by definition, is able to identify existing vulnerabilities in 802.11 networks and execute organized attacks in a controlled and focused manner. An OSWP is able to circumvent various network security restrictions implemented on wireless networks, bypass them, and recover the encryption keys in use. The four hour examination also demonstrates that OSWP’s have a certain degree of persistence and determination and are able to perform under imposed time constraints.


  1. Conduct wireless information gathering.
  2. Circumvent wireless network access restrictions.
  3. Crack various WEP, WPA, and WPA2 implementations.
  4. Implement transparent man-in-the-middle attacks.
  5. Demonstrate their ability to perform under pressure.


Contact the course provider: