HOME > IT & Software > WiFi Penetration Testing (Ethical Hacking) From Scratch

WiFi Penetration Testing (Ethical Hacking) From Scratch

SynopsisWiFi Penetration Testing (Ethical Hacking From Scratch, avai...
WiFi Penetration Testing (Ethical Hacking) From Scratch  No.1

WiFi Penetration Testing (Ethical Hacking) From Scratch, available at $34.99, has an average rating of 4, with 69 lectures, based on 547 reviews, and has 39253 subscribers.

You will learn about Perform WiFi assessments based on commonly known vulnerabilities, exploits and hacking methods Gain a better understanding into the world of ethical hacking Better understand signal frequency This course is ideal for individuals who are Beginner level students who are interested in the world of ethical hacking and penetration testing It is particularly useful for Beginner level students who are interested in the world of ethical hacking and penetration testing.

Enroll now: WiFi Penetration Testing (Ethical Hacking) From Scratch

Summary

Title: WiFi Penetration Testing (Ethical Hacking) From Scratch

Price: $34.99

Average Rating: 4

Number of Lectures: 69

Number of Published Lectures: 69

Number of Curriculum Items: 69

Number of Published Curriculum Objects: 69

Original Price: $199.99

Quality Status: approved

Status: Live

What You Will Learn

  • Perform WiFi assessments based on commonly known vulnerabilities, exploits and hacking methods
  • Gain a better understanding into the world of ethical hacking
  • Better understand signal frequency
  • Who Should Attend

  • Beginner level students who are interested in the world of ethical hacking and penetration testing
  • Target Audiences

  • Beginner level students who are interested in the world of ethical hacking and penetration testing
  • This course aims to teach student’s how to perform tasks of an ethical hacker/penetration tester specifically from a WiFi hacking perspective. Little to no prior knowledge is required for this course, however knowing a few Linux commands would be beneficial. The course covers the entire process of WiFi based ethical hacking from a professional penetration testers point of view.?

    The first set of lectures allows the student to understand what WiFi is and how it works from a technical perspective as well as it’s history and associated weaknesses.

    The course then looks into the various exploitation techniques a hacker would use and accompanies detailed demonstrations of how to find and exploit such issues. The course also covers potential pitfalls that an ethical hacker may encounter when trying to hack specific encryption levels of WiFi as well as how to combat such issues.

    Finally the course concludes with different tools and methods that can be used to break encryption keys to ensure the greatest likelihood of success.

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: 1.01-introduction

    Lecture 2: 1.02-introduction-overview

    Lecture 3: 2.01-wireless-intro

    Lecture 4: 2.02-wireless-intro-part2

    Lecture 5: 3.01-wifi-basics-wifi-intro

    Lecture 6: 3.02-wifi-basics-wifi-intro-2

    Lecture 7: 3.03-wifi-basics-wifi-concepts

    Lecture 8: 3.04-wifi-basics-wifi-concepts-2

    Lecture 9: 3.05-wifi-basics-wifi-concepts-3

    Lecture 10: 3.06-wifi-basics-wifi-phylayers

    Lecture 11: 3.07-wifi-basics-wifi-phylayers-2

    Lecture 12: 3.08-wifi-basics-promiscuous-and-monitor

    Lecture 13: 4.01-security-intro

    Lecture 14: 4.02-security-intro-part2

    Lecture 15: 4.03-security-intro-part3

    Lecture 16: 4.04-security-intro-part4

    Lecture 17: 6.01-wifi-security-intro

    Lecture 18: 6.02-wifi-security-wep

    Lecture 19: 6.03-wifi-security-wep-part2-R1

    Lecture 20: 6.04-wifi-security-wep-part3-R1

    Lecture 21: 6.05-wifi-security-wpa-R1

    Lecture 22: 6.06-wifi-security-dot1x-R1

    Lecture 23: 6.07-wifi-security-wpa2-R1

    Lecture 24: 6.08-wifi-security-psk-enterprise-modes-R1

    Lecture 25: 6.09-wifi-security-wps-R1

    Lecture 26: 7.01-equipment-intro

    Lecture 27: 7.02-equipment-intro2

    Lecture 28: 7.03-equipment-intro3

    Lecture 29: 7.04-kali-linux-wireless-tools

    Lecture 30: 7.05-using-kali-linux-iw

    Lecture 31: 7.06-monitor-mode-airmon

    Lecture 32: 7.06a-monitor-mode-wireshark

    Lecture 33: 7.06b-monitor-mode-wireshark-airodump

    Lecture 34: 7.07-injection-testing

    Lecture 35: 7.08-injection-testing-2

    Lecture 36: 8.01-wep-passive-attacks

    Lecture 37: 8.02-wep-attacks-passive-part2

    Lecture 38: 8.03-wep-attacks-passive-wireshark

    Lecture 39: 8.04-wep-attacks-active

    Lecture 40: 8.05-wep-attacks-active-fragmentation

    Lecture 41: 8.05a-wep-attacks-fragmentation-wireshark

    Lecture 42: 8.06-wep-isolated-client

    Lecture 43: 8.07-wep-cafe-latte-demo

    Lecture 44: 8.08-wep-cafe-latte-and-hirte

    Lecture 45: 9.01-wps-reaver-part1

    Lecture 46: 9.02-wps-reaver-part2

    Lecture 47: 9.03-wps-reaver-part3

    Lecture 48: 10-10.hashcat-ec2

    Lecture 49: 10.01-wpa-and-wpa2-psk

    Lecture 50: 10.01a-wpa-and-wpa2-psk-contd

    Lecture 51: 10.02-wpa-and-wpa2-psk-demo

    Lecture 52: 10.03-wpa-and-wpa2-psk-demo2

    Lecture 53: 10.04-wpa-and-wpa2-psk-wordlists

    Lecture 54: 10.04a-wpa-and-wpa2-deauth

    Lecture 55: 10.05-wpa-and-wpa2-psk-isolated-clients

    Lecture 56: 10.06-wpa-and-wpa2-psk-isolated-clients-demoR1

    Lecture 57: 10.07-hashcat-motivation

    Lecture 58: 10.07a-hashcat-intro

    Lecture 59: 10.08-wpa-and-wpa2-psk-hashcat-demo

    Lecture 60: 10.09-wpa-and-wpa2-psk-hashcat-demo-part2

    Lecture 61: 10.11-hashcat-ec2-part2

    Lecture 62: 10.12-hashcat-ec2-part3

    Lecture 63: 10.13-hashcat-ec2-part4

    Lecture 64: 11.01-social-fluxion-intro

    Lecture 65: 11.02-social-fluxion-demo

    Lecture 66: 11.03-social-fluxion-demo-part2

    Lecture 67: 11.04-social-fluxion-demo-part3

    Lecture 68: 12-01-conclusions

    Lecture 69: 12.02-conclusions-part2

    Instructors

  • WiFi Penetration Testing (Ethical Hacking) From Scratch  No.2
    TWR Internet Solutions Ltd
    Providing high quality, affordable material
  • Rating Distribution

  • 1 stars: 39 votes
  • 2 stars: 41 votes
  • 3 stars: 129 votes
  • 4 stars: 144 votes
  • 5 stars: 194 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!