Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS AWS Certified Developer - Associate CompTIA Security+
Photoshop Graphic Design Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Personal Transformation Meditation Life Purpose Neuroscience Coaching
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Google Analytics
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee

This course includes:

  • 8 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
IT & Software Network & Security Ethical Hacking

WiFi Penetration Testing (Ethical Hacking) From Scratch

Learn how to hack many different forms of WiFi from a penetration testers perspective
Rating: 3.9 out of 53.9 (521 ratings)
39,212 students
Created by TWR Internet Solutions Ltd
Last updated 10/2017
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Perform WiFi assessments based on commonly known vulnerabilities, exploits and hacking methods
  • Gain a better understanding into the world of ethical hacking
  • Better understand signal frequency

Requirements

  • The basics of using Linux based operating systems

Description

This course aims to teach student's how to perform tasks of an ethical hacker/penetration tester specifically from a WiFi hacking perspective. Little to no prior knowledge is required for this course, however knowing a few Linux commands would be beneficial. The course covers the entire process of WiFi based ethical hacking from a professional penetration testers point of view. 

The first set of lectures allows the student to understand what WiFi is and how it works from a technical perspective as well as it's history and associated weaknesses.

The course then looks into the various exploitation techniques a hacker would use and accompanies detailed demonstrations of how to find and exploit such issues. The course also covers potential pitfalls that an ethical hacker may encounter when trying to hack specific encryption levels of WiFi as well as how to combat such issues.

Finally the course concludes with different tools and methods that can be used to break encryption keys to ensure the greatest likelihood of success.

Who this course is for:

  • Beginner level students who are interested in the world of ethical hacking and penetration testing

Course content

1 section • 69 lectures • 8h 3m total length

  • Preview06:46
  • Preview06:31
  • Preview06:35
  • Preview06:07
  • Preview07:02
  • Preview06:18
  • Preview07:27
  • Preview06:52
  • Preview06:52
  • Preview06:56
  • Preview08:15
  • Preview08:52
  • Preview06:39
  • 4.02-security-intro-part2
    04:40
  • 4.03-security-intro-part3
    06:24
  • 4.04-security-intro-part4
    08:54
  • 6.01-wifi-security-intro
    08:11
  • 6.02-wifi-security-wep
    07:13
  • 6.03-wifi-security-wep-part2-R1
    08:08
  • 6.04-wifi-security-wep-part3-R1
    07:04
  • 6.05-wifi-security-wpa-R1
    06:05
  • 6.06-wifi-security-dot1x-R1
    08:37
  • 6.07-wifi-security-wpa2-R1
    07:39
  • 6.08-wifi-security-psk-enterprise-modes-R1
    07:19
  • 6.09-wifi-security-wps-R1
    06:02
  • 7.01-equipment-intro
    07:35
  • 7.02-equipment-intro2
    06:58
  • 7.03-equipment-intro3
    08:15
  • 7.04-kali-linux-wireless-tools
    06:56
  • 7.05-using-kali-linux-iw
    06:03
  • 7.06-monitor-mode-airmon
    06:50
  • 7.06a-monitor-mode-wireshark
    06:50
  • 7.06b-monitor-mode-wireshark-airodump
    06:30
  • 7.07-injection-testing
    06:57
  • 7.08-injection-testing-2
    06:08
  • 8.01-wep-passive-attacks
    07:56
  • 8.02-wep-attacks-passive-part2
    06:27
  • Preview07:42
  • 8.04-wep-attacks-active
    08:47
  • 8.05-wep-attacks-active-fragmentation
    08:12
  • 8.05a-wep-attacks-fragmentation-wireshark
    06:13
  • 8.06-wep-isolated-client
    06:46
  • 8.07-wep-cafe-latte-demo
    05:39
  • 8.08-wep-cafe-latte-and-hirte
    08:30
  • 9.01-wps-reaver-part1
    07:48
  • 9.02-wps-reaver-part2
    06:37
  • 9.03-wps-reaver-part3
    07:37
  • 10-10.hashcat-ec2
    07:04
  • 10.01-wpa-and-wpa2-psk
    07:11
  • 10.01a-wpa-and-wpa2-psk-contd
    06:07
  • 10.02-wpa-and-wpa2-psk-demo
    06:37
  • 10.03-wpa-and-wpa2-psk-demo2
    06:03
  • 10.04-wpa-and-wpa2-psk-wordlists
    07:07
  • 10.04a-wpa-and-wpa2-deauth
    06:59
  • 10.05-wpa-and-wpa2-psk-isolated-clients
    07:27
  • 10.06-wpa-and-wpa2-psk-isolated-clients-demoR1
    06:54
  • 10.07-hashcat-motivation
    06:38
  • 10.07a-hashcat-intro
    06:49
  • 10.08-wpa-and-wpa2-psk-hashcat-demo
    06:33
  • 10.09-wpa-and-wpa2-psk-hashcat-demo-part2
    05:36
  • 10.11-hashcat-ec2-part2
    07:36
  • 10.12-hashcat-ec2-part3
    07:07
  • 10.13-hashcat-ec2-part4
    06:55
  • 11.01-social-fluxion-intro
    06:53
  • 11.02-social-fluxion-demo
    06:59
  • 11.03-social-fluxion-demo-part2
    06:31
  • 11.04-social-fluxion-demo-part3
    06:04
  • 12-01-conclusions
    06:29
  • 12.02-conclusions-part2
    07:36

Instructor

TWR Internet Solutions Ltd
Providing high quality, affordable material
TWR Internet Solutions Ltd
  • 4.1 Instructor Rating
  • 1,453 Reviews
  • 59,915 Students
  • 5 Courses

TWR Internet Solutions Ltd was formed as part of a collaboration of experts specialising in networking, forensics, programming and ethical hacking. The team each have over ten years experience in their specific fields, the company belief is to provide affordable training of a high standard to help aid people from all backgrounds in getting into specialist fields of computing.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.