Wi-Fi Hacking and Wireless Penetration Testing Course
WEP, WPA/WPA2, WPS Cracking, Wifi Recon & Password cracking.Learn how to hack Wi-Fi from real-world penetration tester!
4.59 (331 reviews)

9,046
students
4 hours
content
Feb 2025
last update
$84.99
regular price
What you will learn
Ethical hacking involves a hacker agreeing with an organization or individual who authorizes the hacker to levy cyber attacks on a system.
Becoming an ethical hacker involves learning at least one programming language and having a working knowledge of other common languages like Python, SQL, C++
Ethical hacking is legal because the hacker has full, expressed permission to test the vulnerabilities of a system
Many hackers use the Linux operating system (OS) because Linux is a free and open-source OS, meaning that anyone can modify it. It’s easy to access.
Passing the Certified Information Security Manager (CISM) exam indicates that the credentialed individual is an expert in the governance of information security
The Certified Ethical Hacker (CEH) certification exam supports and tests the knowledge of auditors, security officers, site administrators, security.
The different types of hackers include white hat hackers who are ethical hackers and are authorized to hack systems, black hat hackers who are cybercriminals.
Penetration testing, or pen testing, is the process of attacking an enterprise's network to find any vulnerabilities that could be present to be patched.
In a covert penetration test, also known as a double-blind penetration test, few people in the company will know that a pen test is occurring.
Penetration tests have five different stages. The first stage defines the goals and scope of the test and the testing methods that will be used.
Setting Up The Laboratory
Install Kali Linux - a penetration testing operating system
Wi-Fi Adapter Settings
Wi-Fi Network Fundamentals,IEEE 802.11
Basic Terminologies & Concepts
Wireless Operating Modes : Ad-hoc, Infrastructure, Monitor modes.
Wireless Packet Types
MAC Frame Structure
Analysing Packet Types with Wireshark
Wi-Fi Network Interaction, Authentication Methods
WEP vs WPA/WPA2
WPA2 4-Way Handshake
WPA Personal and Enterprise
Wireless Reconnaissance with Bettercap
Wardriving with Kismet, Mapping with Google Earth
Rogue Access Points with Airbase-ng, Wifi Pumpkin 3, Fluxion
Handshake Snooper and Captive Portal Attack with Fluxion
Evil Twin Attack
WEP Cracking with Client and Clientless Networks
Fake Authentication Attack
Deauthentication Attack with Bettercap
ARP Request Replay Attack
Fragmentation Attack
ChopChop Attack
Cracking WPA/WPA2 with Aircrack-ng, John The Ripper, Cowpatty, Wifite 2
Passwordlists
WPA/WPA2 Cracking using GPUs with Hashcat
Key Reinstallation Attacks (KRACK)
WPS PIN Attacks
ethical hacking
cyber security
android hacking
hacking
Ethical Intelligence
Ethical Hacker
wifi hacking wireless hacking password cracking wireless cracking wifi Wi-Fi Hacking and Wireless Penetration wifi hacking and wireless penetration testing
wi-fi hacking muharrem aydin hacking kismet wireless hack wifi password hacking wireless penetration wifi cracking wifi password wps wireless penetration test
wpa2 wifi hack recon wifi crack wifi hacking course hashcat wi-fi hacking wifi wifi penetration hack wifi
wireless penetration testing wi-fi password penetration testing course offensive resources learn wifi hacking wi-fi hacking and wireless cracking wifi crack
Screenshots




Related Topics
3516104
udemy ID
9/21/2020
course created date
10/1/2020
course indexed date
Lee Jia Cheng
course submited by