Curriculum
12 Sections
53 Lessons
52 Weeks
Expand all sections
Collapse all sections
SEC 1 Preparation - Setting Up The Lab
4
1.1
Installing-windows
2 Minutes
1.2
Snapshots
6 Minutes
1.3
Kali Overview
7 Minutes
1.4
Kali Installing Terminator and Updating
4 Minutes
SEC 2 Network Basics
6
2.1
Networks-basics
3 Minutes
2.2
Adding-usb-to-VM
7 Minutes
2.3
Mac-address
4 Minutes
2.4
Monitor-mode
5 Minutes
2.5
Monitor-mode-method
3 Minutes
2.6
Enabling-monitor-mode-method
4 Minutes
SEC 3 Pre connection attacks
6
3.1
Airodump-basics
5 Minutes
3.2
Targetted-airodump
7 Minutes
3.3
Basic-deauth
4 Minutes
3.4
Fake-ap-theory
3 Minutes
3.5
Fake-ap-practical
10 Minutes
3.6
Mana
9 Minutes
SEC 4 Gsining Access
1
4.1
Gaining-access
1 Minute
SEC 5 Gaining Access WEP Cracking
6
5.1
Gaining-access
1 Minute
5.2
Basic-wep-cracking
5 Minutes
5.3
Fake-auth
6 Minutes
5.4
Arp-request-replay
4 Minutes
5.5
Chopchop
7 Minutes
5.6
Fragment
7 Minutes
Sec 6 Gaining Access - WPAWPA2 Cracking
8
6.1
Wpa-intro
1 Minute
6.2
Wps-cracking
6 Minutes
6.3
Handshake-theory
2 Minutes
6.4
Capturing-handshake
4 Minutes
6.5
Creating-wordlist
5 Minutes
6.6
Wordlist-cracking
3 Minutes
6.7
Airolib-ng
7 Minutes
6.8
Hashcat
6 Minutes
Sec 7 Gaining Access - Security & Mitigation
1
7.1
Sec-done
6 Minutes
Sec 8 Post Connection Attacks
1
8.1
Post-connection-intro
2 Minutes
Sec 9 Post Connection Attacks - Information Gathering
3
9.1
Netdiscover
3 Minutes
9.2
Autoscan
8 Minutes
9.3
Zenmap
10 Minutes
Sec 10 Post Connections Attacks - Man In The Middle Attacks (MITM)
8
10.1
Arpspoof-using-arpspoof
5 Minutes
10.2
Arp-spoofing-using-mitmf
5 Minutes
10.3
Session-hijacking
6 Minutes
10.4
Bypassing-https
4 Minutes
10.5
Dns-spoofing
5 Minutes
10.6
Mitmf-code-injection
6 Minutes
10.7
Mitmf-screenshot-keylogger0
5 Minutes
10.8
Beef-mitmf
9 Minutes
Sec 11 Post Connection Attacks - Gaining Full Control Over Devices On The Same Network
7
11.1
Installing-veil
7 Minutes
11.2
Generating-veil-backdoor
9 Minutes
11.3
Payloads-overview
7 Minutes
11.4
Listening-for-connections
7 Minutes
11.5
Testing-backdoor
7 Minutes
11.6
Creating-a-fake-update
9 Minutes
11.7
General-meterpreter-baics
5 Minutes
sec 12 ARP Poisoning Detection & Security
2
12.1
Detecting-arp-poisonning
5 Minutes
12.2
Detecting-suspecious-behaviour
5 Minutes
Wifi Hacking Penetration Testing From Scratch
Search
This content is protected, please
login
and enroll in the course to view this content!
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Modal title
Main Content