Skip to content

Wi-Fi Hacking and Wireless Penetration Testing Course

WEP, WPA/WPA2, WPS Cracking, Wifi Recon & Password cracking.Learn how to hack Wi-Fi from real-world penetration tester!


Oak Academy

Summary

Price
£16 inc VAT
Study method
Online, On Demand What's this?
Duration
4.3 hours · Self-paced
Qualification
No formal qualification
Certificates
  • Reed courses certificate of completion - Free

1 student purchased this course

Add to basket or enquire

Overview

Hi there,
Welcome to Wi-Fi Hacking and Wireless Penetration Testing Course
WEP, WPA/WPA2, WPS Cracking, Wifi Recon & Password cracking.Learn how to hack Wi-Fi from real-world penetration tester!

Ethical hacking is a whole new technology in itself. The techniques of hacking are rapidly growing in numbers with hackers every day coming up with new ideas to steal our personal data. One such widely preferred ways of hacking is Wi-Fi hacking.

Wi-Fi hacking is easier than hacking a device connected to that WiFi. There are many free tools that can hack the less secure WiFi router. Apart from this, there are also advanced tools that work on backtrack and can even hack Wi-Fi router with high security.

In this course, you will learn how to crack the key and get the password to WiFi networks whether they use WEP, WPA, or even WPA2. While you are learning ethically hack you will also learn how to secure networks from hackers.

This course is for all levels. We will take you from beginner to advance level. You will learn step-by-step with hands-on demonstrations.
Whether you want to get your first job in IT security, become a white hat hacker, or prepare to check the security of your own home network, Oak Academy offers practical and accessible ethical hacking courses to help keep your networks safe from cybercriminals.

Penetration testing skills make you a more marketable IT tech. Understanding how to exploit servers, networks, and applications means that you will also be able to better prevent malicious exploitation. From website and network hacking, to pen testing in Python and Metasploit, Reed has a course for you.

At the end of the course you will learn;

  • Wireless Operating Modes: Ad-hoc, Infrastructure, Monitor modes.

  • Wireless Packet Types

  • MAC Frame Structure

  • Analysing Packet Types with Wireshark

  • Wi-Fi Network Interaction, Authentication MethodsWEP vs WPA/WPA2

  • WPA2 4-Way Handshake

  • WPA Personal and Enterprise

  • Wireless Reconnaissance with Bettercap

  • Wardriving with Kismet, Mapping with Google Earth

  • Rogue Access Points with Airbase-ng, Wifi Pumpkin 3, Fluxion

  • Handshake Snooper and Captive Portal Attack with Fluxion

  • Evil Twin Attack

  • WEP Cracking with Client and Clientless Networks

  • Fake Authentication Attack

  • Deauthentication Attack with Bettercap

  • ARP Request Replay Attack

  • Fragmentation Attack

  • ChopChop Attack

  • Cracking WPA/WPA2 with Aircrack-ng, John The Ripper, Cowpatty, Wifite 2

  • Passwordlists

  • WPA/WPA2 Cracking using GPUs with Hashcat

  • Key Reinstallation Attacks (KRACK)

  • WPS PIN Attacks and more...

  • Network Security

  • ethical

  • Ethical Intelligence

  • nmap nessus

  • nmap course

  • nmap metaspolit

  • Complete nmap

  • Kali linux nmap

  • ethical hacking

  • penetration testing

  • bug bounty

  • hack

  • cyber security

  • kali linux

  • android hacking

  • network security

  • hacking

  • security

  • security testing

  • nmap

  • metasploit

  • metasploit framework

  • penetration testing

  • oscp

  • security testing

  • windows hacking

  • exploit

  • bug bounty

  • bug bounty hunting

  • website hacking

  • web hacking

  • pentest+

  • pentest plus

  • OSINT (Open Source Intelligent )

  • social engineering

  • phishing

  • social engineering tool kit

  • wifi hacking wireless hacking password cracking wireless cracking wifi Wi-Fi Hacking and Wireless Penetration wifi hacking and wireless penetration testing wi-fi hacking muharrem aydin hacking kismet wireless hack wifi password hacking wireless penetration wifi cracking wifi password wps wireless penetration test wpa2 wifi hack recon wifi crack wifi hacking course hashcat wi-fi hacking wifi wifi penetration hack wifi wireless penetration testing wi-fi password penetration testing course offensive resources learn wifi hacking wi-fi hacking and wireless cracking wifi crack wifi evil twin attack

No prior knowledge is needed!

It doesn't need any prior knowledge to learn Ethical Hacking

This course starts with very basics. First, you will learn how to install the tools, some terminology. Then the show will start and you will learn everything with hands-on practices. I'll also teach you the best practices and shortcuts.

Step-by-Step Way, Simple and Easy With Exercises

By the end of the course, you’ll have a firm understanding of the Wifi Hacking and valuable insights on how things work under the hood and you'll also be very confident in cracking the key and get the password to WiFi networks, and hungry to learn more. The good news is since the Free and popular tools are used you don’t need to buy any tool or application.

You'll also get:

Lifetime Access to The Course

Fast & Friendly Support in the Q&A section

Dive in now to my Wi-Fi Hacking and Penetration Testing.

Curriculum

9
sections
67
lectures
4h 18m
total
    • 1: Wi-Fi Hacking and Wireless Penetration Testing Course 00:57
    • 2: Introduction to Wi-Fi Hacking and Wireless Penetration Testing Course 04:06
    • 3: FAQ regarding Ethical Hacking 03:00
    • 4: FAQ regarding Penetration Testing 02:00
    • 5: Hardware and Software Requirements 07:03
    • 6: Virtualisation Platform 01:00
    • 7: Enabling Virtualization (VT-x or AMD-V) in BIOS 01:00
    • 8: Lab's Archtitecture Diagram 03:24
    • 9: Using VirtualBox vs VMware 01:00
    • 10: VirtualBox: Install & Run 05:03
    • 11: Important Note before Kali Installation 01:00
    • 12: Installing Kali From VMware File for VMware - Step 1 03:13
    • 13: Installing Kali From VMware File for VMware - Step 2 04:47
    • 14: Installing Kali From VMware File for VMware - Step3 04:12
    • 15: Installing Kali From ISO File for VMware - Step 1 01:27
    • 16: Installing Kali From ISO File for VMware - Step2 06:49
    • 17: Installing Kali From ISO File for VMware - Step 3 01:47
    • 18: Installing Kali From ISO File for Virtualbox - Step1 01:27
    • 19: Installing Kali From ISO File for VirtualBox - Step2 06:50
    • 20: Installing Kali From OVA File for VirtualBox - Step 1 03:14
    • 21: Installing Kali From OVA File for VirtualBox - Step 2 06:45
    • 22: Installing Kali From OVA File for VirtualBox - Step 3 04:12
    • 23: Updates for Kali Linux 2021.4 01:00
    • 24: Wi-Fi Adapter Settings 06:17
    • 25: IEEE-802.11 03:54
    • 26: Basic Terminologies and Concepts 04:51
    • 27: Wireless Operating Modes 06:11
    • 28: MAC Frame Structure 02:58
    • 29: Wireless Packet Types 05:22
    • 30: Wireshark: Analysing Packet Types 06:33
    • 31: Wi-Fi Network Interaction 05:04
    • 32: Wireless Encryption Protocols: WEP vs. WPA 03:58
    • 33: WPA 4-Way Handshake 05:46
    • 34: WPA2 Personal and Enterprise 03:16
    • 35: Wireshark: WEP and WPA 01:10
    • 36: Wi-Fi Protected Setup (WPS) 03:50
    • 37: quiz 01:00
    • 38: Wireless Recon with Bettercap 03:35
    • 39: Wardriving with Kismet: Installation 05:56
    • 40: Wardriving with Kismet: Configuration 06:45
    • 41: Wardriving with Kismet: Mapping 04:50
    • 42: Airbase-ng 05:47
    • 43: Evil Twin Attack 06:42
    • 44: Wifi Pumpkin 3 07:31
    • 45: Fluxion: Installation 02:50
    • 46: Fluxion: Handshake Snooper Attack 04:54
    • 47: Fluxion: Captive Portal Attack 05:29
    • 48: quiz 01:00
    • 49: WEP Cracking - Preparing Attacks 02:49
    • 50: WEP Cracking - Fake Authentication Attack 03:51
    • 51: WEP Cracking - Deauthentication Attack 02:59
    • 52: WEP Cracking - Deauthentication Attack with Bettercap 01:32
    • 53: WEP Cracking - ARP Request Replay Attack 04:15
    • 54: WEP Cracking - Fragmentation Attack 05:10
    • 55: WEP Cracking - ChopChop Attack 03:48
    • 56: quiz 01:00
    • 57: WPA/WPA2 Cracking - Introduction 05:13
    • 58: WPA/WPA2 Cracking - Aircrack-ng 03:57
    • 59: WPA/WPA2 Cracking - John The Ripper 04:10
    • 60: WPA/WPA2 Cracking - CoWPAtty 02:52
    • 61: WPA/WPA2 Cracking - Wifite 2 02:21
    • 62: WPA/WPA2 Cracking with GPUs : Hashcat - 1 05:26
    • 63: WPA/WPA2 Cracking with GPUs : Hashcat - 2 03:52
    • 64: WPA/WPA2 Cracking - Key Reinstallation Attack (KRACK) 07:13
    • 65: quiz 01:00
    • 66: WPS Cracking - Wifite 2: PIN Attack 03:50
    • 67: What we learned 01:56

Course media

Description

Hi there,
Welcome to Wi-Fi Hacking and Wireless Penetration Testing Course
WEP, WPA/WPA2, WPS Cracking, Wifi Recon & Password cracking.Learn how to hack Wi-Fi from real-world penetration tester!

Ethical hacking is a whole new technology in itself. The techniques of hacking are rapidly growing in numbers with hackers every day coming up with new ideas to steal our personal data. One such widely preferred ways of hacking is Wi-Fi hacking.

Wi-Fi hacking is easier than hacking a device connected to that WiFi. There are many free tools that can hack the less secure WiFi router. Apart from this, there are also advanced tools that work on backtrack and can even hack Wi-Fi router with high security.

In this course, you will learn how to crack the key and get the password to WiFi networks whether they use WEP, WPA, or even WPA2. While you are learning ethically hack you will also learn how to secure networks from hackers.

This course is for all levels. We will take you from beginner to advance level. You will learn step-by-step with hands-on demonstrations.
Whether you want to get your first job in IT security, become a white hat hacker, or prepare to check the security of your own home network, Oak Academy offers practical and accessible ethical hacking courses to help keep your networks safe from cybercriminals.

Penetration testing skills make you a more marketable IT tech. Understanding how to exploit servers, networks, and applications means that you will also be able to better prevent malicious exploitation. From website and network hacking, to pen testing in Python and Metasploit, Reed has a course for you.

At the end of the course you will learn;

  • Wireless Operating Modes: Ad-hoc, Infrastructure, Monitor modes.

  • Wireless Packet Types

  • MAC Frame Structure

  • Analysing Packet Types with Wireshark

  • Wi-Fi Network Interaction, Authentication MethodsWEP vs WPA/WPA2

  • WPA2 4-Way Handshake

  • WPA Personal and Enterprise

  • Wireless Reconnaissance with Bettercap

  • Wardriving with Kismet, Mapping with Google Earth

  • Rogue Access Points with Airbase-ng, Wifi Pumpkin 3, Fluxion

  • Handshake Snooper and Captive Portal Attack with Fluxion

  • Evil Twin Attack

  • WEP Cracking with Client and Clientless Networks

  • Fake Authentication Attack

  • Deauthentication Attack with Bettercap

  • ARP Request Replay Attack

  • Fragmentation Attack

  • ChopChop Attack

  • Cracking WPA/WPA2 with Aircrack-ng, John The Ripper, Cowpatty, Wifite 2

  • Passwordlists

  • WPA/WPA2 Cracking using GPUs with Hashcat

  • Key Reinstallation Attacks (KRACK)

  • WPS PIN Attacks and more...

  • Network Security

  • ethical

  • Ethical Intelligence

  • nmap nessus

  • nmap course

  • nmap metaspolit

  • Complete nmap

  • Kali linux nmap

  • ethical hacking

  • penetration testing

  • bug bounty

  • hack

  • cyber security

  • kali linux

  • android hacking

  • network security

  • hacking

  • security

  • security testing

  • nmap

  • metasploit

  • metasploit framework

  • penetration testing

  • oscp

  • security testing

  • windows hacking

  • exploit

  • bug bounty

  • bug bounty hunting

  • website hacking

  • web hacking

  • pentest+

  • pentest plus

  • OSINT (Open Source Intelligent )

  • social engineering

  • phishing

  • social engineering tool kit

  • wifi hacking wireless hacking password cracking wireless cracking wifi Wi-Fi Hacking and Wireless Penetration wifi hacking and wireless penetration testing wi-fi hacking muharrem aydin hacking kismet wireless hack wifi password hacking wireless penetration wifi cracking wifi password wps wireless penetration test wpa2 wifi hack recon wifi crack wifi hacking course hashcat wi-fi hacking wifi wifi penetration hack wifi wireless penetration testing wi-fi password penetration testing course offensive resources learn wifi hacking wi-fi hacking and wireless cracking wifi crack wifi evil twin attack

No prior knowledge is needed!

It doesn't need any prior knowledge to learn Ethical Hacking

This course starts with very basics. First, you will learn how to install the tools, some terminology. Then the show will start and you will learn everything with hands-on practices. I'll also teach you the best practices and shortcuts.

Step-by-Step Way, Simple and Easy With Exercises

By the end of the course, you’ll have a firm understanding of the Wifi Hacking and valuable insights on how things work under the hood and you'll also be very confident in cracking the key and get the password to WiFi networks, and hungry to learn more. The good news is since the Free and popular tools are used you don’t need to buy any tool or application.

You'll also get:

Lifetime Access to The Course

Fast & Friendly Support in the Q&A section

Dive in now to my Wi-Fi Hacking and Penetration Testing.

Who is this course for?

  • Anyone who want to do a Penetration Testing against Wi-Fi networks.
  • Anyone who are the System administrators and want to audit their Wi-Fi network configuration.
  • Anyone who want to protect themselves against these attacks.
  • People who are wifi hacking experts
  • People who want job transition into wireless hacking
  • People who want to take their password cracking skills to the next level

Requirements

  • Wi-Fi Adapter
  • 4 GB (Gigabytes) of RAM or higher (8 GB recommended) for wifi hacking
  • 64-bit system processor is mandatory for wireless hacking
  • 10 GB or more disk space for password cracking
  • Enable virtualization technology on BIOS settings, such as “Intel-VTx” for wireless
  • All items referenced in this course are Free for cracking
  • A strong desire to understand hacker tools and techniques in wifi
  • A strong work ethic, willingness to learn and plenty of excitement about the back door of the digital world
  • Nothing else! It’s just you, your computer and your ambition to get started today for wi-fi hacking

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Certificates

Reed courses certificate of completion

Digital certificate - Included

Will be downloadable when all lectures have been completed

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.