- Introduction 1
- IntroductionLecture1.1
 
 - Lab Preparation 4
- Needed SoftwareLecture2.102 min
 - Installing Kali Linux on WindowsLecture2.210 min
 - Installing Kali Linux on Mac OSLecture2.310 min
 - Kali OverviewLecture2.416 min
 
 - Network Fundamentals 4
- How Does A Network Work?Lecture3.103 min
 - How to Change Your MAC AddressLecture3.204 min
 - How to Connect a Wireless Adapter?Lecture3.304 min
 - Managed & Monitor ModesLecture3.403 min
 
 - Network Cracking 11
- Getting Familiar With Airodump-ngLecture4.106 min
 - Using a Deauthentication Attack to Disconnect Users From The NetworkLecture4.207 min
 - Hacking WEP NetworksLecture4.307 min
 - Hacking WPA & WPA2 Networks That Use WPSLecture4.409 min
 - Capturing The Network HandshakeLecture4.505 min
 - Using Wifite to Capture The HandshakeLecture4.608 min
 - Hacking WPA & WPA2 Networks Using a WordlistLecture4.705 min
 - Using The GPU to Crack WPA & WPA2 Network’s KeyLecture4.809 min
 - Using The GPU to Crack Netgear Routers’ KeyLecture4.906 min
 - Hacking WPA & WPA2 Networks Using An Evil Twin AttackLecture4.1016 min
 - Using Fluxion To Hack WPA & WPA2 NetworksLecture4.1109 min
 
 - Attacking The Network After Connecting to it 8
- Gathering Information About The Connected DevicesLecture5.106 min
 - Running Netdiscover With Passive ModeLecture5.206 min
 - Gathering Useful Information From The Router’s GUILecture5.304 min
 - Man In The Middle Attack – TheoryLecture5.405 min
 - Installing Windows As a Virtual MachineLecture5.503 min
 - Man In The Middle Attack – In PracticeLecture5.608 min
 - Bypassing HTTPS WebsitesLecture5.7
 - Moderately Bypassing HSTS WebsitesLecture5.810 min
 
 - Hacking Into Network Devices 3
- Introduction to EmpireLecture6.1
 - Creating Undetectable Backdoors Using EmpireLecture6.207 min
 - Using Empire’s Modules & Commands To Control The Victim DeviceLecture6.311 min
 
 - Securing Yourself From The Previous Attacks 2
- Practical Methods To Secure The NetworkLecture7.103 min
 - Adding HTTPS Everywhere PluginLecture7.204 min
 
 
This content is protected, please login and enroll course to view this content!
