WiFi Hacking: Wireless Penetration and Security MasterClass

  • Overview
  • Curriculum
  • Instructor
  • Review

About This Course

Learn How to Hack All Types of Wireless Networks. Complete Series From Very Basic to Highly Advance Wireless Hacking.

In this course we are going to learn about each and every aspect of wireless networks what is a wireless network? How it works? What are the weakness of wireless network? We have setup this course in a way in which you can understand the core concept of wireless. We will start each section by understanding how different Protocol works so you will have complete understanding of each Protocol and you don’t become script kiddies. We will start with very basic how wireless network works we will learn about different Bands, Channels and Frequencies. We will also learn about different wireless adapters and different modes of wireless adapter like monitor mode and managed mode after that we will dive into more advanced concepts like Packet sniffing and Target sniffing. We will also look the difference between 2.4GHz & 5GHz frequencies and packet sniffing on 5GHz network. Then we will look into how to discover Hidden Networks. After that we will see how to maximize the power of wireless adapter.  Then we will try to understand WEP (Wired Equivalent Privacy) Protocol and see its weakness. After that we will try to pentest WEP based network. After doing that we will learn about WPS (Wi-Fi Protected Setup) and how we can hack into this protocol. Then we will learn and understand about the most secure protocol WPA/WPA2 Personal and see how this protocol works and why it's so much secure we also try and understand about 4-way handshake. Then we will pentest WPA/WPA2 Personal network as well and see how we can hack these types of networks using Dictionary Attack. After that we will try to pentest WPA/WPA2 with Evil Twin Attacks. Then we will see how Captive Portals work. Nowadays Captive Portals are used in Hotels, Coffee shops and Malls etc. We will also see how we hack networks which are based on Captive Portals. Then we will look into WPA2 Enterprise networks and first try to understand its protocol then we will pentest WPA2 Enterprise network and see how we can get access to these networks.

After understanding all Protocols and their weakness we will look some special hacking scenarios and to solve those scenarios we will create a hacking hardware with Raspberry PI. If you don't know anything about Raspberry PI don’t worry we are going to explain each and every thing about it. Starting from what Raspberry PI is? How we can use it in penetration testing what tools and software we going to install on it. We are going to cover all these in a separate section in this course. After getting good understanding of Raspberry PI we will use it in penetration testing WPS enabled networks. After that we will use Raspberry PI in WPA/WPA2 penetration testing. After covering all the aspects of wireless hacking we will see how we can overcome all the weakness in each of the protocol and see how we can make wireless networks more secure.

  • Basics of wireless how wireless works

  • Advance wireless concepts

  • Scan all networks & devices within wireless range

Course Curriculum

1 Lectures

3 Lectures

2 Lectures

1 Lectures

1 Lectures

1 Lectures

1 Lectures

Instructors

Profile photo of Arsalan Saleem
Arsalan Saleem

I'm a Security Expert and Software Developer with 7+ years experience. I love to work on innovative offensive security ideas. I have developed many web application and mobile applications. I have also worked on security of many industrial software's. Currently I'm working on exploit research and use of deep learning with micro controllers in Penetration Testing.

Instructors

Profile photo of Secure Techware
Secure Techware

SecureTechware believes in the philosophy of innovation for serving the employees, clients and the community effectively. We believe in quality and reliability in order to deliver superior services. Whether it is new development, update or maintenance; our company has a potential to provide the best!Our vision is to be the innovation leader in the I.T. services. We are determined to...

Review
4.9 course rating
4K ratings
ui-avatar of Andrew Osbourne
Andrew O.
3.0
1 year ago

Difficult to follow if you are operating from Apple and not windows. I would not recommend based on this alone. It is also 5 years old so I'm not sure if some of the talking points are still applicable. If there was a similar product for apple users then I would be in a position to offer a different critique.

  • Helpful
  • Not helpful
ui-avatar of Precious
Precious
4.0
1 year ago

the lecturer was precise and it was easy to learn

  • Helpful
  • Not helpful
ui-avatar of Shuja Ali
Shuja A.
5.0
2 years ago

explained in very detail

  • Helpful
  • Not helpful
ui-avatar of Nadia
Nadia
5.0
3 years ago

detail theory of protocols great !

  • Helpful
  • Not helpful
ui-avatar of Aaiza Khan
Aaiza K.
5.0
3 years ago

course is good

  • Helpful
  • Not helpful
ui-avatar of ImtiazAli
Imtiazali
5.0
3 years ago

good intro

  • Helpful
  • Not helpful
ui-avatar of Daniel Rizzo
Daniel R.
5.0
3 years ago

I am very happy with what I learned in this course. Thank you.

  • Helpful
  • Not helpful
ui-avatar of Bilal Ashraf
Bilal A.
5.0
3 years ago

great course learn new things

  • Helpful
  • Not helpful
ui-avatar of Usman Rauf
Usman R.
1.0
3 years ago

Please dont purchase it. This guy is a Scam. And knows nothing. Spend half of the time installing Kali linux. Avoid this guy.

  • Helpful
  • Not helpful
ui-avatar of Corporate Security Institute (CSI)
Corporate S. I. (.
5.0
3 years ago

very depth and intresting, I must recommend this course.

  • Helpful
  • Not helpful
Leave A Reply

Your email address will not be published. Required fields are marked *

Ratings

Courses You May Like

Lorem ipsum dolor sit amet elit
Show More Courses