Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
Wireless networks are popping up everywhere.. It will be the most commonly used technology among computer networks in the near future. They provide a lot of freedom but not without cost: All too many home and corporate wireless networks are left wide open for attack.
This course takes an in-depth look at the security challenges of many different wireless technologies, exposing you to wireless security threats through the eyes of an attacker. Using readily available and custom-developed tools, you will navigate your way through the techniques attackers use to exploit Wi-Fi networks, including attacks againstWEP, WPA/WPA2, WPSand other systems.
Using assessment and analysis techniques, this course will show you how to identify the threats that expose wireless technology and build on this knowledge to implement defensive techniques that can be used to protect wireless systems.
In this course we teach everything fromscratchandno pre-existing knowledgeis needed. So as long as you have a working internet connection, a wireless router and a computer/laptop you are good to go.
With 25 modules for this course and Challenge Assignments for topics, we make sure you understand the topic from the ground up to the deep packet level.
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: Getting Started with the Course|
Introduction to the Course
|Section 2: Setting up Hacking Lab|
Basic Requirements for this CoursePreview
Windows vs Linux for Wireless Hacking & Security
Installing Kali Linux
Configuring Wireless Adapter
Let's get started with basic Wi-Fi Security Tools
Understanding the Linux Interfaces
Introduction to Packet Capturing
|Section 3: SSID|
Understanding & Hiding SSID
Hacking into Hidden SSID
|Section 4: Mac Filtering|
Understanding Basics of MAC FilteringPreview
Hacking into MAC Filters
|Section 5: WEP Hacking|
Basic behind Wi-Fi Security Protocols
Understanding WEP Protocol
Hacking WEP based Wi-Fi Networks
|Section 6: WPA Hacking|
Understanding WPA / WPA2 ProtocolPreview
Hacking WPA/WPA2 Based Networks
|Section 7: Some More Cool Tricks|
Creating Fake Wi-Fi Device
Deploying Fake Wi-Fi in your Area
Deploying a Simple Wi-Fi Jammer
|Section 8: What's Next for Future|
What's Next in Wi-Fi Security
I am Zeal Vora. I work as a Cloud Security Engineer. Working into the field of Security, we face tens of thousands of hacking attempts everyday and protecting the Servers from those is a challenging task but that is what makes the work Cool :)
My domain of expertise lies in Linux & Information Security. I hold many Certifications like : Certified Ethical Hacker, RedHat Certified Engineer, VMware Certified Associate for Cloud Computing, Data Center Virtualization, Workforce Mobility.
One of my passions is teaching and i have been teaching at personal tutor level to that of University level. One of my aim is to make Education free at some point of time. I'll look forward to that.