Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Mindfulness Meditation Personal Transformation Life Purpose Emotional Intelligence Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Google Analytics
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Modeling Data Analysis Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Blogging Freelancing Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Network Security

Learn Network Hacking From Scratch (WiFi & Wired)

Learn how to hack both WiFi and wired networks like black hat hackers, and learn how to secure them from these attacks.
Rating: 4.6 out of 54.6 (4,135 ratings)
48,509 students
Created by Zaid Sabih, z Security
Last updated 10/2020
English
English [Auto], Italian [Auto], 
30-Day Money-Back Guarantee

What you'll learn

  • 60+ detailed videos about practical networks attacks
  • Control connections of clients around you without knowing the password.
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Hack any computer on the same network.
  • Intercept data and spy on all on the network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • A number of practical attacks that can be used without knowing the key to the target network
  • ARP Spoofing/ARP Poisonning
  • Launch Various Man In The Middle attacks.
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • Detect ARP poisoning and protect your self and your network against it.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
  • Combine individual attacks to launch even more powerful attacks.
Curated for the Udemy for Business collection

Requirements

  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).

Description

Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.


The Course is Divided into three main sections: 

  1. Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode  and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn  how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

  2. Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

  3. Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.


All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.).  in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

With this course you'll get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you within 15 hours.


Notes:

  • This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.

  • This course is totally a product of Zaid Sabih & zSecurity, no other organization is associated for certification exam for the same. Although, you will receive Course Completion Certification from Udemy, apart from that No OTHER ORGANIZATION IS INVOLVED. 

Who this course is for:

  • Anybody who is interested in learning about network penetration testing
  • Anybody interested into learning how to protect networks from hackers.

Featured review

Bradley Scott
Bradley Scott
9 courses
10 reviews
Rating: 5.0 out of 5a year ago
Giving the experience I have, this course suited me a lot as it taught me more about network security, the resources where very useful and it was well put together, It is for intermediate to advanced experienced users in computer security as some of the terminology will go above you capability's to understand really enjoyed the course.

Course content

14 sections • 63 lectures • 7h 28m total length

  • Preview03:35

  • Lab Overview & Needed Software
    07:48
  • Installing Kali 2020 As a Virtual Machine
    11:13
  • Creating & Using Snapshots
    05:36
  • Kali Linux Overview
    05:10
  • The Linux Terminal & Basic Commands
    11:21

  • Network Basics
    04:28
  • Connecting a Wireless Adapter To Kali
    05:09
  • MAC Address - What Is It & How To Change It
    08:20
  • Wireless Modes (Managed & Monitor mode)
    06:57

  • Packet Sniffing Basics Using Airodump-ng
    06:40
  • WiFi Bands - 2.4Ghz & 5Ghz Frequencies
    07:54
  • Targeted Packet Sniffing Using Airodump-ng
    10:30
  • Deauthentication Attack (Disconnecting Any Device From The Network)
    06:50

  • Preview01:09

  • Theory Behind Cracking WEP Encryption
    05:47
  • Basic Case
    06:17
  • Associating With Target Network Using Fake Authentication Attack
    06:45
  • Packet Injection - ARP Request Reply Attack
    06:09
  • Packet Injection - Korek Chopchop Attack
    07:42
  • Preview07:44

  • Introduction to WPA / WPA2 Cracking
    03:42
  • Exploiting the WPS Feature
    10:11
  • How to Capture a Handshake
    06:49
  • Creating a Wordlist / Dictionary
    07:33
  • Cracking the Key Using a Wordlist Attack
    06:26
  • Preview07:00
  • Cracking WPA/WPA2 Much Faster Using GPU - Part 1
    07:19
  • Cracking WPA/WPA2 Much Faster Using GPU - Part 2
    10:39

  • Securing Your Network From The Above Attacks
    02:03
  • How to Configure Wireless Security Settings To Secure Your Network
    06:25

  • Preview02:10
  • Installing Windows As a Virtual machine
    02:37

  • Discovering Connected Clients using netdiscover
    08:39
  • Gathering More Information Using Zenmap
    06:45
  • Gathering Even More Information Using Zenmap
    08:08

Instructors

Zaid Sabih
Ethical Hacker, Computer Scientist & CEO of zSecurity
Zaid Sabih
  • 4.6 Instructor Rating
  • 130,515 Reviews
  • 547,762 Students
  • 9 Courses

My name is Zaid Al-Quraishi, I am an ethical hacker, a computer scientist, and the founder and CEO of zSecurity. I just love hacking and breaking the rules, but don’t get me wrong as I said I am an ethical hacker.

I have tremendous experience in ethical hacking, I started making video tutorials back in 2009 in an ethical hacking community (iSecuri1ty), I also worked as a pentester for the same company. In 2013 I started teaching my first course live and online, this course received amazing feedback which motivated me to publish it on Udemy.

This course became the most popular and the top paid course in Udemy for almost a year, this motivated me to make more courses, now I have a number of ethical hacking courses, each focusing on a specific field, dominating the ethical hacking topic on Udemy.

Now I have more than 650,000 students on Udemy and other teaching platforms such as StackSocial, StackSkills and zSecurity.

z Security
Leading provider of ethical hacking and cyber security training,
z Security
  • 4.6 Instructor Rating
  • 130,515 Reviews
  • 542,656 Students
  • 9 Courses

zSecurity is a leading provider of ethical hacking and cyber security training, we teach hacking and security to help people become ethical hackers so they can test and secure systems from black-hat hackers. 

Becoming an ethical hacker is simple but not easy, there are many resources online but lots of them are wrong and outdated, not only that but it is hard to stay up to date even if you already have a background in cyber security. 


Our goal is to educate people and increase awareness by exposing methods used by real black-hat hackers and show how to secure systems from these hackers.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.