WiFi Penetration Testing (Ethical Hacking) From Scratch
3.9 (375 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
32,817 students enrolled

WiFi Penetration Testing (Ethical Hacking) From Scratch

Learn how to hack many different forms of WiFi from a penetration testers perspective
3.9 (375 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
32,817 students enrolled
Last updated 10/2017
English
English [Auto-generated]
Current price: Free Original price: $199.99 Discount: 100% off
30-Day Money-Back Guarantee
This course includes
  • 8 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to Udemy's top 3,000+ courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Perform WiFi assessments based on commonly known vulnerabilities, exploits and hacking methods
  • Gain a better understanding into the world of ethical hacking

  • Better understand signal frequency

Requirements
  • The basics of using Linux based operating systems
Description

This course aims to teach student's how to perform tasks of an ethical hacker/penetration tester specifically from a WiFi hacking perspective. Little to no prior knowledge is required for this course, however knowing a few Linux commands would be beneficial. The course covers the entire process of WiFi based ethical hacking from a professional penetration testers point of view. 

The first set of lectures allows the student to understand what WiFi is and how it works from a technical perspective as well as it's history and associated weaknesses.

The course then looks into the various exploitation techniques a hacker would use and accompanies detailed demonstrations of how to find and exploit such issues. The course also covers potential pitfalls that an ethical hacker may encounter when trying to hack specific encryption levels of WiFi as well as how to combat such issues.

Finally the course concludes with different tools and methods that can be used to break encryption keys to ensure the greatest likelihood of success.

Who this course is for:
  • Beginner level students who are interested in the world of ethical hacking and penetration testing
Course content
Expand 69 lectures 08:03:59
+ Introduction
69 lectures 08:03:59
4.02-security-intro-part2
04:40
4.03-security-intro-part3
06:24
4.04-security-intro-part4
08:54
6.01-wifi-security-intro
08:11
6.02-wifi-security-wep
07:13
6.03-wifi-security-wep-part2-R1
08:08
6.04-wifi-security-wep-part3-R1
07:04
6.05-wifi-security-wpa-R1
06:05
6.06-wifi-security-dot1x-R1
08:37
6.07-wifi-security-wpa2-R1
07:39
6.08-wifi-security-psk-enterprise-modes-R1
07:19
6.09-wifi-security-wps-R1
06:02
7.01-equipment-intro
07:35
7.02-equipment-intro2
06:58
7.03-equipment-intro3
08:15
7.04-kali-linux-wireless-tools
06:56
7.05-using-kali-linux-iw
06:03
7.06-monitor-mode-airmon
06:50
7.06a-monitor-mode-wireshark
06:50
7.06b-monitor-mode-wireshark-airodump
06:30
7.07-injection-testing
06:57
7.08-injection-testing-2
06:08
8.01-wep-passive-attacks
07:56
8.02-wep-attacks-passive-part2
06:27
8.04-wep-attacks-active
08:47
8.05-wep-attacks-active-fragmentation
08:12
8.05a-wep-attacks-fragmentation-wireshark
06:13
8.06-wep-isolated-client
06:46
8.07-wep-cafe-latte-demo
05:39
8.08-wep-cafe-latte-and-hirte
08:30
9.01-wps-reaver-part1
07:48
9.02-wps-reaver-part2
06:37
9.03-wps-reaver-part3
07:37
10-10.hashcat-ec2
07:04
10.01-wpa-and-wpa2-psk
07:11
10.01a-wpa-and-wpa2-psk-contd
06:07
10.02-wpa-and-wpa2-psk-demo
06:37
10.03-wpa-and-wpa2-psk-demo2
06:03
10.04-wpa-and-wpa2-psk-wordlists
07:07
10.04a-wpa-and-wpa2-deauth
06:59
10.05-wpa-and-wpa2-psk-isolated-clients
07:27
10.06-wpa-and-wpa2-psk-isolated-clients-demoR1
06:54
10.07-hashcat-motivation
06:38
10.07a-hashcat-intro
06:49
10.08-wpa-and-wpa2-psk-hashcat-demo
06:33
10.09-wpa-and-wpa2-psk-hashcat-demo-part2
05:36
10.11-hashcat-ec2-part2
07:36
10.12-hashcat-ec2-part3
07:07
10.13-hashcat-ec2-part4
06:55
11.01-social-fluxion-intro
06:53
11.02-social-fluxion-demo
06:59
11.03-social-fluxion-demo-part2
06:31
11.04-social-fluxion-demo-part3
06:04
12-01-conclusions
06:29
12.02-conclusions-part2
07:36