Complete Ethical Hacking Series: Wireless Hacking Ninja
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
838 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Complete Ethical Hacking Series: Wireless Hacking Ninja to your Wishlist.

Add to Wishlist

Complete Ethical Hacking Series: Wireless Hacking Ninja

Become a Wireless Hacking Ninja Using Open Source Hacking Tools!
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
838 students enrolled
Created by Chad Russell
Last updated 7/2017
English
English [Auto-generated]
Current price: $10 Original price: $20 Discount: 50% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 1.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Students will learn how to hack wireless networks using open-source tools and pass the wireless hacking sections of the CEHv9 certification exam.
View Curriculum
Requirements
  • Students should have a working understanding of TCP/IP and networking concepts.
Description

Complete Ethical Hacking Series:  Wireless Hacking Ninja

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures!   Each chapter closes with exercises putting your new learned skills into practical use immediately.   

What are the pre-requisites for this course?

  1. Students should have a working understanding of TCP/IP and networking concepts. 

What will you be able to do after taking this course?

  • Wireless Hacking with Kismet - Kismet is a network detector, packet sniffer and intrusion detection system for 802.11 Wireless LANs.   Kismet will work with any wireless card which supports raw monitoring mode and can sniff 802.11a, 802.11b, 802.11g and 802.11n traffic. The program runs under Linux and OSX.  


  • Wi-Fi Pineapple - The WiFi Pineapple® NANO and TETRA are the 6th generation auditing platforms from Hak5. Thoughtfully developed for mobile and persistent deployments, they build on over 8 years of WiFi penetration testing expertise.


    • WiFi man-in-the-middle platform
    • Highly effective rogue AP suite
    • Over-the-air apps and modules
    • Advanced client and AP filtering
    • Intuitive web interface
    • Simplified auditing workflow
    • Live reconnaissance view
    • At-a-glance intelligence
    • Device tracking and alerting
    • Reports emailed at set intervals
    • Built on embedded Linux
    • Free software updates


  • Ubertooth - The Ubertooth One is an opensource Bluetooth test tool from Michael Ossmann. It is the world's first affordable Bluetooth monitoring and development platform and is a fully open source product (both hardware and software). 


  • Bluetooth Low Energy Hacking - Bluetooth Low Energy (BLE), sometimes referred to as "Bluetooth Smart", is a light-weight subset of classic Bluetooth and was introduced as part of the Bluetooth 4.0 core specification. While there is some overlap with classic Bluetooth, BLE actually has a completely different lineage and was started by Nokia as an in-house project called 'Wibree' before being adopted by the Bluetooth SIG.


  • Hacking Wireless with Metasploit - The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS Signature development.
    Its best-known sub-project is the open source Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shell code archive and related research. The Metasploit Project is well known for its anti-forensic and evasion tools, some of which are built into the Metasploit Framework.
  • Aircrack - Aircrack-ng is a complete suite of tools to assess WiFi network security.
    It focuses on different areas of WiFi security:
    • Monitoring: Packet capture and export of data to text files for further processing by third party tools.
    • Attacking: Replay attacks, deauthentication, fake access points and others via packet injection.
    • Testing: Checking WiFi cards and driver capabilities (capture and injection).
    • Cracking: WEP and WPA PSK (WPA 1 and 2).
  • Reaver - Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations.
    On average Reaver will recover the target AP’s plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase
Who is the target audience?
  • This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! Each chapter closes with exercises putting your new learned skills into practical use immediately.
Compare to Other Ethical Hacking Courses
Curriculum For This Course
9 Lectures
01:28:46
+
Complete Ethical Hacking Series (CEHv9) : Wireless Hacking Ninja
9 Lectures 01:28:46
  • Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is a notoriously weak security standard. The password it uses can often be cracked in a few minutes with a basic laptop computer and widely available software tools. WEP is an old IEEE 802.11 standard from 1999, which was outdated in 2003 by WPA, or Wi-Fi Protected Access. WPA was a quick alternative to improve security over WEP. The current standard is WPA2; some hardware cannot support WPA2 without firmware upgrade or replacement. WPA2 uses an encryption device that encrypts the network with a 256-bit key; the longer key length improves security over WEP.
Preview 08:18

  • Aircrack - Aircrack-ng is a complete suite of tools to assess WiFi network security. It focuses on different areas of WiFi security:
    • Monitoring: Packet capture and export of data to text files for further processing by third party tools.
    • Attacking: Replay attacks, deauthentication, fake access points and others via packet injection.
    • Testing: Checking WiFi cards and driver capabilities (capture and injection).
    • Cracking: WEP and WPA PSK (WPA 1 and 2).
  • Reaver - Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations. On average Reaver will recover the target AP’s plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase
Preview 08:28

Wi-Fi Pineapple - The WiFi Pineapple® NANO and TETRA are the 6th generation auditing platforms from Hak5. Thoughtfully developed for mobile and persistent deployments, they build on over 8 years of WiFi penetration testing expertise.

  • WiFi man-in-the-middle platform
  • Highly effective rogue AP suite
  • Over-the-air apps and modules
  • Advanced client and AP filtering
  • Intuitive web interface
  • Simplified auditing workflow
  • Live reconnaissance view
  • At-a-glance intelligence
  • Device tracking and alerting
  • Reports emailed at set intervals
  • Built on embedded Linux
  • Free software updates
Man-in-the-Middle Attacks with Wi-Fi Pineapple
09:36

  • The risks to users of wireless technology have increased as the service has become more popular. There were relatively few dangers when wireless technology was first introduced. Hackers had not yet had time to latch on to the new technology, and wireless networks were not commonly found in the work place. However, there are many security risks associated with the current wireless protocols and encryption methods, and in the carelessness and ignorance that exists at the user and corporate IT level.  Hacking methods have become much more sophisticated and innovative with wireless access. Hacking has also become much easier and more accessible with easy-to-use Windows or Linux-based tools being made available on the web at no charge.
Advanced Wireless Security
14:46

  • Bluetooth Low Energy Hacking - Bluetooth Low Energy (BLE), sometimes referred to as "Bluetooth Smart", is a light-weight subset of classic Bluetooth and was introduced as part of the Bluetooth 4.0 core specification. While there is some overlap with classic Bluetooth, BLE actually has a completely different lineage and was started by Nokia as an in-house project called 'Wibree' before being adopted by the Bluetooth SIG.
Bluetooth Low Energy Hacks
11:02

  • Ubertooth - The Ubertooth One is an opensource Bluetooth test tool from Michael Ossmann. It is the world's first affordable Bluetooth monitoring and development platform and is a fully open source product (both hardware and software). 
Ubertooth
15:40

  • Software-defined radio (SDR) is a radio communication system where components that have been typically implemented in hardware are instead implemented by means of software on a personal computer.  While the concept of SDR is not new, the rapidly evolving capabilities of digital electronics render practical many processes which used to be only theoretically possible.
Software Defined Radio
06:16

  • KisMAC is a wireless network discovery tool for Mac OS X. It has a wide range of features, similar to those of Kismet (its Linux/BSD namesake). The program is geared toward network security professionals, and is not as novice-friendly as similar applications. Distributed under the GNU GPL.  KisMAC is free software
Kismac
03:03

  • Hacking Wireless with Metasploit - The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS Signature development. Its best-known sub-project is the open source Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shell code archive and related research. The Metasploit Project is well known for its anti-forensic and evasion tools, some of which are built into the Metasploit Framework.
Pwning over Wireless with Metasploit
11:37
About the Instructor
Chad Russell
3.8 Average rating
1,126 Reviews
23,029 Students
24 Courses
Join the Cyber Security Industry in 2016!

Instructor Bio – Chad Russell

Join the Cyber Security Industry in 2017!

If you are interested in starting a career in the Cyber Security Industry 2016 is the time! 

Learning the fundamentals of Cyber Security provides you with  a powerful and very useful set of skills.  Study Penetration Testing and Ethical Hacking and learn to think like a hacker so you can better defend your networks and data.   

Jobs in Cyber Security are plentiful, and getting Security+ Certified will give you a strong background to more easily pick up and tackle more advanced exams such as the Certified Ethical Hacker and CISSP certifications.  

Get certified and land an entry level Cyber Security position paying upwards of six figures!  There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   

But, don't take my word for it...please take a look at the FREE previews (they are available in all my courses) and see for yourself.  This year I have partnered with webofsecurity.com, a premier provider of ‘All Things Information Security’ to bring you a fantastic suite of Cyber Security certification training to help you get into the hottest industry in IT. 

About me:

Hello, I’m Chad Russell.  I’ve been in the CyberSecurity industry for over 15 years.  I’ve taught Microsoft Engineering courses as a Certified trainer, I’ve managed teams of security engineers and analysts for an internet banking provider, I’ve been an information security consultant working for companies including SAP, Microsoft and Oracle.   

I lead and conduct 'Security Risk Assessments' for customers throughout North America with an emphasis on cloud security, identity governance, network security, social engineering, mobile security, breach assessments, database security and access management.  

Over the past 15 years I've held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications and have a B.S. in Computer Science from Excelsior College  I can help you get certified and get ahead!