About Course
Explore advanced methods in WiFi security and ethical hacking to safeguard wireless networks. Learn to identify vulnerabilities, execute attacks such as deauthentication and WEP/WPA cracking, and utilize tools like Kali Linux and Raspberry Pi for effective penetration testing.
Gain expertise in WiFi security and ethical hacking to defend wireless networks against threats.
Requirements
- Basic understanding of networking concepts.
- Knowledge of ethical hacking principles.
- A computer with internet access.
- Willingness to learn advanced WiFi security techniques.
Course Curriculum
Section 1: Introduction & Lab Setup
- 1. Course Introduction
- 2. Overview of Lab Setup
- 3. Installing Virtualization Software and Operating Systems
- 4. Configuring OS in VMware
- 5. Exploring Kali Linux Basics
- 6. Creating Snapshots for Backup
- Assessment Exercise 01
Section 2: Fundamentals of Wireless Networking
- 7. What is a Wireless Network?
- 8. Introduction to WiFi Adapters
- 9. WiFi Adapter Modes Explained
- 10. WLAN Frequency Bands and Channels
- 11. Understanding MAC Addresses
- 12. Beacon Frames Overview
- Assessment Exercise 02
Section 3: Advanced Wireless Concepts
- 13. Basics of Packet Sniffing
- 14. Targeted Packet Sniffing Techniques
- 15. Sniffing on 5GHz Networks
- 16. Executing Deauthentication Attacks
- 17. Discovering Hidden SSIDs
- 18. Verifying MAC Addresses
- 19. Enhancing WiFi Adapter Performance
- Assessment Exercise 03
Section 4: WEP Protocol and Exploits
- 20. Overview of WEP Protocol
- 21. Introduction to WEP Attacks
- 22. WEP Attacks Without Client Devices
- Assessment Exercise 04
Section 5: WPS Vulnerabilities and Attacks
- 23. What is WPS?
- 24. Performing WPS Attacks
- 25. Techniques to Bypass WPS Locks
- Assessment Exercise 05
Section 6: WPA & WPA2 Protocols
- 26. Introduction to WPA and WPA2 Protocols
- 27. Methods to Crack WPA/WPA2
- Assessment Exercise 06
Section 7: WPA/WPA2 Wordlist Attacks
- 28. WPA/WPA2 Wordlist Attack Basics
- 29. Continued Wordlist Attack Techniques
- 30. Saving Dictionary Attack Progress
- 31. Accelerating Cracks Using Rainbow Tables
- Assessment Exercise 07
Section 8: Evil Twin Attacks on WPA/WPA2
- 32. Understanding Evil Twin Attacks
- 33. Setting Up an Evil Twin Access Point
- 34. Executing Evil Twin Attacks
- Assessment Exercise 08
Section 9: Captive Portal Attacks
- 35. Introduction to Captive Portals
- 36. Understanding Man-in-the-Middle (MitM) Attacks
- 37. Performing Captive Portal MitM Attacks
- Assessment Exercise 09
Section 10: WPA2 Enterprise Hacking
- 38. Overview of WPA2 Enterprise
- 39. Techniques for Hacking WPA2 Enterprise
- 40. WPA2 Enterprise Attack Part 1
- 41. WPA2 Enterprise Attack Part 2
- Assessment Exercise 10
Section 11: Resource Optimization for Penetration Testing
- 42. Common Challenges and Problem Scenarios
- 43. Minimum Hardware Requirements
- 44. Recommended Hardware Setup
- Assessment Exercise 11
Section 12: Introduction to Raspberry Pi
- 45. What is Raspberry Pi?
- 46. Components and Features of Raspberry Pi
- Assessment Exercise 12
Section 13: Setting Up Raspberry Pi
- 47. Installing the OS on Micro SD Card
- 48. Overview of Raspbian OS
- 49. Using VNC Viewer for Remote Access
- 50. Installing Kali Linux Tools on Raspberry Pi
- Assessment Exercise 13
Section 14: WPS & WPA/WPA2 Attacks Using Raspberry Pi
- 51. Conducting WPS Attacks with Raspberry Pi
- 52. Performing WPA/WPA2 Wordlist Attacks on Raspberry Pi
- 53. Best Practices to Secure Your Network
- Assessment Exercise 14
Section 15: Final Exam
- Final Exam

