Course curriculum
-
-
1.1 - Introduction
-
1.2 - Why Learn Hacking
-
-
-
2.1 - Lab Introduction
-
2.2 - Installing Kali Linux Using a Pre-Built Image
-
2.3 - Installing Kali Linux Using an ISO Image
-
2.4 - Installing Windows
-
2.5 - Installing Metasploitable
-
2.6 - How to Create Snapshots
-
-
-
3.1 - Kali Linux Overview
-
3.2 - Terminal & Basic Linux Commands
-
3.3 - Updating Source List & Installing Programs
-
-
-
4.1 - Network Penetration Testing Introduction
-
4.2 - How Networks Work
-
4.3 - Connecting a Wireless Adapter
-
4.4 - Changing MAC Addresses
-
4.5 - Wireless Monitor Modes & How to Change Them
-
-
-
5.1 - Packet Sniffing Using Airodump-ng1
-
5.2 - Targeted Packet Sniffing Using Airodump-ng1
-
5.3 - De-authentication Attack (Disconnecting Any Device From A Network)
-
5.4 - Creating a Fake Access Point - Theory
-
5.5 - Creating a Fake Access Point - Practical
-
-
-
6.1 - Gaining Access to the Networks Introduction
-
6.2 - Cracking WEP Encryption - Theory
-
6.3 - Cracking WEP Encryption (Basic Case)
-
6.5 - Cracking WEP Encryption (ARP Replay Attack)
-
6.7 - Cracking WPA & WPA2 Encryption (Exploiting WPS) - Practical
-
6.8 - Cracking WPA & WPA2 Encryption (Using Wifite)
-
6.9 - Cracking WPA & WPA2 Encryption (Capturing Handshake) - Theory
-
6.10 - Cracking WPA & WPA2 Encryption (Capturing Handshake) - Practical
-
6.11 - Creating a Wordlist Using Crunch
-
6.12 - Launching a Wordlist Attack to Crack WPA & WPA2 Password
-
About this course
- $8.00
- 59 lessons
- 8.5 hours of video content