Course details
***10/2017 Closed Captions (CC) have been added to the Course***
Welcome to my course on WirelessPenetration Testing with Kali Linux & Raspberry Pi!
In this course, you will start as abeginnerwith no previous knowledge about penetration testing orhacking.
This course is focused on thepractical side ofpenetrationtesting without neglecting the theory behind each attack. Before jumping into penetration testing, youwill first learn how toset up a lab and install needed softwareto practice penetration testing on your own machine.
Once you understand how wireless networks are working, we will discuss about how these can beexploited by hackers and what we can do to protect them. This course will take youfrom a beginner to a more advanced level --by the time you will complete the course, you will beable to identify the hacking attacks against your network and take the necessary steps to protect it. We will use the same tools that hackers are using in order to protect our networks.All the attacks explained in this course are launched against real devices in my lab.
The course is divided into two main sections:
In the first section, we will discuss about installing the penetration tools on our Raspberry Pi device. In case you dont want to use a Raspberry Pi, I will explain how to install the pen tools on a virtual machine on your PC or Mac. Next well talk about setting up the wireless adapter and prepare for the actual hack.
In the second section, we will take a look at several hacking attacks and ways to protect our network from these attacks. The hacking attacks are so powerful that they can disrupt our network or compromise it at high level. Topics like bypassing MAC address filtering, shared key authentication, WEP and WAP will be presented step by step.
The course will be completed with a discussion about the techniques that hackers are using to penetrate wireless networks and what we can do to stop them.
This course is an excellent introduction to Network and Systemssecurity. We will use a Raspberry Pi device throughout this course but you canalso follow along by installing Kali Linux on your computer, a process describedin the course also.
Ever wanted to know how hackers are breaking into your networkand what you can do to stop them? Then this course isfor you!
We will play the role of a Pen Tester or White Hat Hacker inorder to discover network and system vulnerabilities and then see how we canprotect against them.
Scanyour network for vulnerabilities before hackers are taking action against yoursystem!
Learn how to protect against common vulnerabilitiesthat are present in Operating Systems and how to better understand how ComputerSecurity works.
Don't be caught off-guard and protect your network beforehackers discovers the vulnerabilities in your system.
Take action today!
NOTE: This course is created for educational purposes only andall the attacks are launched in my own lab or against devices that I have permission to test.
Updated on 14 November, 2018- JavaScript Full stack web developer virtual internship Virtual Bootcamp + Internship at LaimoonAED 1,449Duration: Upto 30 Hours
- Mikrotik with IPSEC VPN Tunnel Skill-UpUSD 14Duration: Upto 4 Hours
- Certified Security Sentinel (CSS) St. Paul's CollegeUSD 13Duration: Upto 4 Hours