Course curriculum

    1. 1.1 - Introduction

    2. 1.2 - Why Learn Hacking

    1. 2.1 - Lab Introduction

    2. 2.2 - Installing Kali Linux Using a Pre-Built Image

    3. 2.3 - Installing Kali Linux Using an ISO Image

    4. 2.4 - Installing Windows

    5. 2.5 - Installing Metasploitable

    6. 2.6 - How to Create Snapshots

    1. 3.1 - Kali Linux Overview

    2. 3.2 - Terminal & Basic Linux Commands

    3. 3.3 - Updating Source List & Installing Programs

    1. 4.1 - Network Penetration Testing Introduction

    2. 4.2 - How Networks Work

    3. 4.3 - Connecting a Wireless Adapter

    4. 4.4 - Changing MAC Addresses

    5. 4.5 - Wireless Monitor Modes & How to Change Them

    1. 5.1 - Packet Sniffing Using Airodump-ng1

    2. 5.2 - Targeted Packet Sniffing Using Airodump-ng1

    3. 5.3 - De-authentication Attack (Disconnecting Any Device From A Network)

    4. 5.4 - Creating a Fake Access Point - Theory

    5. 5.5 - Creating a Fake Access Point - Practical

    1. 6.1 - Gaining Access to the Networks Introduction

    2. 6.2 - Cracking WEP Encryption - Theory

    3. 6.3 - Cracking WEP Encryption (Basic Case)

    4. 6.5 - Cracking WEP Encryption (ARP Replay Attack)

    5. 6.7 - Cracking WPA & WPA2 Encryption (Exploiting WPS) - Practical

    6. 6.8 - Cracking WPA & WPA2 Encryption (Using Wifite)

    7. 6.9 - Cracking WPA & WPA2 Encryption (Capturing Handshake) - Theory

    8. 6.10 - Cracking WPA & WPA2 Encryption (Capturing Handshake) - Practical

    9. 6.11 - Creating a Wordlist Using Crunch

    10. 6.12 - Launching a Wordlist Attack to Crack WPA & WPA2 Password

About this course

  • $8.00
  • 59 lessons
  • 8.5 hours of video content