- Introduction 1
- IntroductionLecture1.1
- Lab Preparation 4
- Needed SoftwareLecture2.102 min
- Installing Kali Linux on WindowsLecture2.210 min
- Installing Kali Linux on Mac OSLecture2.310 min
- Kali OverviewLecture2.416 min
- Network Fundamentals 4
- How Does A Network Work?Lecture3.103 min
- How to Change Your MAC AddressLecture3.204 min
- How to Connect a Wireless Adapter?Lecture3.304 min
- Managed & Monitor ModesLecture3.403 min
- Network Cracking 11
- Getting Familiar With Airodump-ngLecture4.106 min
- Using a Deauthentication Attack to Disconnect Users From The NetworkLecture4.207 min
- Hacking WEP NetworksLecture4.307 min
- Hacking WPA & WPA2 Networks That Use WPSLecture4.409 min
- Capturing The Network HandshakeLecture4.505 min
- Using Wifite to Capture The HandshakeLecture4.608 min
- Hacking WPA & WPA2 Networks Using a WordlistLecture4.705 min
- Using The GPU to Crack WPA & WPA2 Network’s KeyLecture4.809 min
- Using The GPU to Crack Netgear Routers’ KeyLecture4.906 min
- Hacking WPA & WPA2 Networks Using An Evil Twin AttackLecture4.1016 min
- Using Fluxion To Hack WPA & WPA2 NetworksLecture4.1109 min
- Attacking The Network After Connecting to it 8
- Gathering Information About The Connected DevicesLecture5.106 min
- Running Netdiscover With Passive ModeLecture5.206 min
- Gathering Useful Information From The Router’s GUILecture5.304 min
- Man In The Middle Attack – TheoryLecture5.405 min
- Installing Windows As a Virtual MachineLecture5.503 min
- Man In The Middle Attack – In PracticeLecture5.608 min
- Bypassing HTTPS WebsitesLecture5.7
- Moderately Bypassing HSTS WebsitesLecture5.810 min
- Hacking Into Network Devices 3
- Introduction to EmpireLecture6.1
- Creating Undetectable Backdoors Using EmpireLecture6.207 min
- Using Empire’s Modules & Commands To Control The Victim DeviceLecture6.311 min
- Securing Yourself From The Previous Attacks 2
- Practical Methods To Secure The NetworkLecture7.103 min
- Adding HTTPS Everywhere PluginLecture7.204 min
