Wi-Fi Hacking and Wireless Penetration Testing Course

WEP, WPA/WPA2, WPS Cracking, Wifi Recon & Password cracking.Learn how to hack Wi-Fi from real-world penetration tester!
4.59 (331 reviews)
Udemy
platform
English
language
Development Tools
category
instructor
Wi-Fi Hacking and Wireless Penetration Testing Course
9,046
students
4 hours
content
Feb 2025
last update
$84.99
regular price

What you will learn

Ethical hacking involves a hacker agreeing with an organization or individual who authorizes the hacker to levy cyber attacks on a system.

Becoming an ethical hacker involves learning at least one programming language and having a working knowledge of other common languages like Python, SQL, C++

Ethical hacking is legal because the hacker has full, expressed permission to test the vulnerabilities of a system

Many hackers use the Linux operating system (OS) because Linux is a free and open-source OS, meaning that anyone can modify it. It’s easy to access.

Passing the Certified Information Security Manager (CISM) exam indicates that the credentialed individual is an expert in the governance of information security

The Certified Ethical Hacker (CEH) certification exam supports and tests the knowledge of auditors, security officers, site administrators, security.

The different types of hackers include white hat hackers who are ethical hackers and are authorized to hack systems, black hat hackers who are cybercriminals.

Penetration testing, or pen testing, is the process of attacking an enterprise's network to find any vulnerabilities that could be present to be patched.

In a covert penetration test, also known as a double-blind penetration test, few people in the company will know that a pen test is occurring.

Penetration tests have five different stages. The first stage defines the goals and scope of the test and the testing methods that will be used.

Setting Up The Laboratory

Install Kali Linux - a penetration testing operating system

Wi-Fi Adapter Settings

Wi-Fi Network Fundamentals,IEEE 802.11

Basic Terminologies & Concepts

Wireless Operating Modes : Ad-hoc, Infrastructure, Monitor modes.

Wireless Packet Types

MAC Frame Structure

Analysing Packet Types with Wireshark

Wi-Fi Network Interaction, Authentication Methods

WEP vs WPA/WPA2

WPA2 4-Way Handshake

WPA Personal and Enterprise

Wireless Reconnaissance with Bettercap

Wardriving with Kismet, Mapping with Google Earth

Rogue Access Points with Airbase-ng, Wifi Pumpkin 3, Fluxion

Handshake Snooper and Captive Portal Attack with Fluxion

Evil Twin Attack

WEP Cracking with Client and Clientless Networks

Fake Authentication Attack

Deauthentication Attack with Bettercap

ARP Request Replay Attack

Fragmentation Attack

ChopChop Attack

Cracking WPA/WPA2 with Aircrack-ng, John The Ripper, Cowpatty, Wifite 2

Passwordlists

WPA/WPA2 Cracking using GPUs with Hashcat

Key Reinstallation Attacks (KRACK)

WPS PIN Attacks

ethical hacking

cyber security

android hacking

hacking

Ethical Intelligence

Ethical Hacker

wifi hacking wireless hacking password cracking wireless cracking wifi Wi-Fi Hacking and Wireless Penetration wifi hacking and wireless penetration testing

wi-fi hacking muharrem aydin hacking kismet wireless hack wifi password hacking wireless penetration wifi cracking wifi password wps wireless penetration test

wpa2 wifi hack recon wifi crack wifi hacking course hashcat wi-fi hacking wifi wifi penetration hack wifi

wireless penetration testing wi-fi password penetration testing course offensive resources learn wifi hacking wi-fi hacking and wireless cracking wifi crack

Screenshots

Wi-Fi Hacking and Wireless Penetration Testing Course - Screenshot_01Wi-Fi Hacking and Wireless Penetration Testing Course - Screenshot_02Wi-Fi Hacking and Wireless Penetration Testing Course - Screenshot_03Wi-Fi Hacking and Wireless Penetration Testing Course - Screenshot_04
3516104
udemy ID
9/21/2020
course created date
10/1/2020
course indexed date
Lee Jia Cheng
course submited by
Wi-Fi Hacking and Wireless Penetration Testing Course - Coupon | Comidoc