From Zero to Hero in Web, Network and WiFi Hacking

Learn Basic to Advanced Web, Network and WiFi Hacking

What's Inside

This course aims to teach you in depth WiFi Hacking and Security. After completing this course you will be confident with breaking all types of WiFi encryption methods.

In this course you will start as beginner without or with low knowledge about WiFi security and Kali Linux.

This course is separated in 7 main sections:

  • Introduction - In this section you will see what you will be introduced to course outline and requirements for this course.
  • Working Environment setup - Here you will set your working environment and tools required for successful
  • Kali Linux Introduction - In this section you will be introduced to the main system you will be using
  • Network Basics - In this section students will learn how does the network work
  • Essentials Tools - We will learn essentials tools required for penetration
  • Passive Information Gathering - In this section you will learn how to passively gather information
  • Active Information Gathering - Same as previous section but here you will learn active gathering of information
  • Vulnerability Scanning - Here you will learn how to found vulnerabilities of the target
  • Buffer Overflows - This section will teach you how to overrun buffer memory
  • Windows Buffer Overflow example - Here you will see example of buffer overrun in Windows system
  • Password Attacks - This section will teach you how to require passwords actively with direct attacks on password
  • Client Side Web Vulnerabilities - Here you will learn what are vulnerabilities users on the web
  • Server Side Web Vulnerabilities - This section will teach you vulnerabilities of host machines / servers
  • WiFi Getting Access - Here you will learn how to attack WiFi network in order to connect to it
  • WiFi Preconnection Attacks - This section will teach you how to require WiFi login details without active attack
  • Port Fun - This section shows you how to scan entrance to the host machine trough ports
  • Post Exploitation - This phase actually deals with collecting sensitive information, documenting it, and having an idea of the configuration settings, network interfaces, and other communication channels
  • Extra - All the good stuff here
  • Simulated Penetration Testing - Here you will need to test and exercise your defenses to ensure they're up to the task. The best way to do this is by simulating real-world attacks.

Course Curriculum

Get started now!



Certificate Available
75554+ Students
128 Lectures
7+ Hours of Video
Lifetime Access
24/7 Support
Instructor Rating
LearnPentest

We are penetration testers and ethical hackers with an extensive background in web application security, web and software development, network administration and exploit development. Over 7 years of professional experience in cyber security domain.

We found security issues in Google's products (YouTube XSS), Microsoft, Verizon, eBay, Prezi, AT&T and many others. Our instructors hold one of the most valuable certifications in cyber security domain; OSCP, LPT, C|EH, CISSP, OSCE.


Popular Bundles