WiFi Penetration Testing (Ethical Hacking) From Scratch
WiFi Penetration Testing (Ethical Hacking) From Scratch, available at $34.99, has an average rating of 4, with 69 lectures, based on 547 reviews, and has 39253 subscribers.
You will learn about Perform WiFi assessments based on commonly known vulnerabilities, exploits and hacking methods Gain a better understanding into the world of ethical hacking Better understand signal frequency This course is ideal for individuals who are Beginner level students who are interested in the world of ethical hacking and penetration testing It is particularly useful for Beginner level students who are interested in the world of ethical hacking and penetration testing.
Enroll now: WiFi Penetration Testing (Ethical Hacking) From Scratch
Summary
Title: WiFi Penetration Testing (Ethical Hacking) From Scratch
Price: $34.99
Average Rating: 4
Number of Lectures: 69
Number of Published Lectures: 69
Number of Curriculum Items: 69
Number of Published Curriculum Objects: 69
Original Price: $199.99
Quality Status: approved
Status: Live
What You Will Learn
- Perform WiFi assessments based on commonly known vulnerabilities, exploits and hacking methods
- Gain a better understanding into the world of ethical hacking
- Better understand signal frequency
Who Should Attend
- Beginner level students who are interested in the world of ethical hacking and penetration testing
Target Audiences
- Beginner level students who are interested in the world of ethical hacking and penetration testing
This course aims to teach student’s how to perform tasks of an ethical hacker/penetration tester specifically from a WiFi hacking perspective. Little to no prior knowledge is required for this course, however knowing a few Linux commands would be beneficial. The course covers the entire process of WiFi based ethical hacking from a professional penetration testers point of view.
The first set of lectures allows the student to understand what WiFi is and how it works from a technical perspective as well as it’s history and associated weaknesses.
The course then looks into the various exploitation techniques a hacker would use and accompanies detailed demonstrations of how to find and exploit such issues. The course also covers potential pitfalls that an ethical hacker may encounter when trying to hack specific encryption levels of WiFi as well as how to combat such issues.
Finally the course concludes with different tools and methods that can be used to break encryption keys to ensure the greatest likelihood of success.
Course Curriculum
Chapter 1: Introduction
Lecture 1: 1.01-introduction
Lecture 2: 1.02-introduction-overview
Lecture 3: 2.01-wireless-intro
Lecture 4: 2.02-wireless-intro-part2
Lecture 5: 3.01-wifi-basics-wifi-intro
Lecture 6: 3.02-wifi-basics-wifi-intro-2
Lecture 7: 3.03-wifi-basics-wifi-concepts
Lecture 8: 3.04-wifi-basics-wifi-concepts-2
Lecture 9: 3.05-wifi-basics-wifi-concepts-3
Lecture 10: 3.06-wifi-basics-wifi-phylayers
Lecture 11: 3.07-wifi-basics-wifi-phylayers-2
Lecture 12: 3.08-wifi-basics-promiscuous-and-monitor
Lecture 13: 4.01-security-intro
Lecture 14: 4.02-security-intro-part2
Lecture 15: 4.03-security-intro-part3
Lecture 16: 4.04-security-intro-part4
Lecture 17: 6.01-wifi-security-intro
Lecture 18: 6.02-wifi-security-wep
Lecture 19: 6.03-wifi-security-wep-part2-R1
Lecture 20: 6.04-wifi-security-wep-part3-R1
Lecture 21: 6.05-wifi-security-wpa-R1
Lecture 22: 6.06-wifi-security-dot1x-R1
Lecture 23: 6.07-wifi-security-wpa2-R1
Lecture 24: 6.08-wifi-security-psk-enterprise-modes-R1
Lecture 25: 6.09-wifi-security-wps-R1
Lecture 26: 7.01-equipment-intro
Lecture 27: 7.02-equipment-intro2
Lecture 28: 7.03-equipment-intro3
Lecture 29: 7.04-kali-linux-wireless-tools
Lecture 30: 7.05-using-kali-linux-iw
Lecture 31: 7.06-monitor-mode-airmon
Lecture 32: 7.06a-monitor-mode-wireshark
Lecture 33: 7.06b-monitor-mode-wireshark-airodump
Lecture 34: 7.07-injection-testing
Lecture 35: 7.08-injection-testing-2
Lecture 36: 8.01-wep-passive-attacks
Lecture 37: 8.02-wep-attacks-passive-part2
Lecture 38: 8.03-wep-attacks-passive-wireshark
Lecture 39: 8.04-wep-attacks-active
Lecture 40: 8.05-wep-attacks-active-fragmentation
Lecture 41: 8.05a-wep-attacks-fragmentation-wireshark
Lecture 42: 8.06-wep-isolated-client
Lecture 43: 8.07-wep-cafe-latte-demo
Lecture 44: 8.08-wep-cafe-latte-and-hirte
Lecture 45: 9.01-wps-reaver-part1
Lecture 46: 9.02-wps-reaver-part2
Lecture 47: 9.03-wps-reaver-part3
Lecture 48: 10-10.hashcat-ec2
Lecture 49: 10.01-wpa-and-wpa2-psk
Lecture 50: 10.01a-wpa-and-wpa2-psk-contd
Lecture 51: 10.02-wpa-and-wpa2-psk-demo
Lecture 52: 10.03-wpa-and-wpa2-psk-demo2
Lecture 53: 10.04-wpa-and-wpa2-psk-wordlists
Lecture 54: 10.04a-wpa-and-wpa2-deauth
Lecture 55: 10.05-wpa-and-wpa2-psk-isolated-clients
Lecture 56: 10.06-wpa-and-wpa2-psk-isolated-clients-demoR1
Lecture 57: 10.07-hashcat-motivation
Lecture 58: 10.07a-hashcat-intro
Lecture 59: 10.08-wpa-and-wpa2-psk-hashcat-demo
Lecture 60: 10.09-wpa-and-wpa2-psk-hashcat-demo-part2
Lecture 61: 10.11-hashcat-ec2-part2
Lecture 62: 10.12-hashcat-ec2-part3
Lecture 63: 10.13-hashcat-ec2-part4
Lecture 64: 11.01-social-fluxion-intro
Lecture 65: 11.02-social-fluxion-demo
Lecture 66: 11.03-social-fluxion-demo-part2
Lecture 67: 11.04-social-fluxion-demo-part3
Lecture 68: 12-01-conclusions
Lecture 69: 12.02-conclusions-part2
Instructors
-
TWR Internet Solutions Ltd
Providing high quality, affordable material
Rating Distribution
- 1 stars: 39 votes
- 2 stars: 41 votes
- 3 stars: 129 votes
- 4 stars: 144 votes
- 5 stars: 194 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024