Learn Network Hacking From Scratch

User Avatar
(0 review)
All levels
5.5 hours
25071
$190.00 $99.00

How to become a network hacker

Do you want to learn network hacking? Do you want to secure your home or work network? How about launching a new career in the world of professional penetration testing or ethical hacking? If so, this is the course for you.

Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you’ll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

Learn Network Hacking From Scratch course content

Learn Network hacking fundamentals
Crack WiFi keys (WEP/WPA/WPA2)
Intercept & Manipulate Traffic
Secure networks from the discussed attacks

Why is this course so in demand?

Lifetime access to course materials and videos
Set the pace of your own study
Learn the way that best suits you
Get answers from our Support Team within 15 hours
Verifiable zSecurity certificate of completion
Unlimited updates to course materials and videos

Plus! Free 1-month VIP membership with:

Live mentoring and Q&A session with course instructor and CTO, Zaid
Instant support from community members through our private discord channel
Daily updates with the latest tutorials and news from the hacking world
Daily resources like CTFs, bug bounty programs, onion services and more
Access our VIP community and connect with like-minded people
Discounts and offers on other zSecurity products and services

Here's how it works

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of Linux, computer systems and networks, then you will learn how to use this knowledge to exploit networks and carry out a number of powerful attacks.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop …etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android …ect.).  in each technique you will understand the theory behind it and how it works, then you’ll learn how to use that technique in a real life scenario. By the end of the course you’ll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

Learn Network Hacking From Scratch course?

Basic Information Technology knowledge
No Linux, programming or hacking knowledge
Computer with a minimum of 4GB RAM/Memory
Operating System: Windows / OS X / Linux
WiFi cracking (10 lectures ONLY): WiFi adapter supporting monitor mode
$190.00 $99.00

Reviews

0
0 rating
5
0%
4
0%
3
0%
2
0%
1
0%

Curriculum

  • Introduction 1

  • Preparation - Setting Up The Lab 8

    • Lecture2.1
      Lab Overview 06 min
    • Lecture2.2
      Initial Preparation 09 min
    • Lecture2.3
      Installing Kali Linux as a VM on Windows 09 min
    • Lecture2.4
      Installing Kali Linux as a VM on Apple Mac OS 10 min
    • Lecture2.5
      Installing Kali Linux as a VM on M1 Apple Computers 09 min
    • Lecture2.6
      Installing Kali Linux as a VM on Linux 11 min
    • Lecture2.7
      Kali Linux Overview 05 min
    • Lecture2.8
      The Linux Terminal & Basic Commands 13 min
  • Network Basics 4

    • Lecture3.1
      Network Basics 03 min
    • Lecture3.2
      Connecting a Wireless Adapter To Kali 07 min
    • Lecture3.3
      MAC Address – What Is It & How To Change It 05 min
    • Lecture3.4
      Wireless Modes (Managed & Monitor mode) 05 min
  • Pre-Connection Attacks 4

    • Lecture4.1
      Packet Sniffing Basics Using Airodump-ng 06 min
    • Lecture4.2
      WiFi Bands – 2.4Ghz & 5Ghz Frequencies 30 min
    • Lecture4.3
      Targeted Packet Sniffing Using Airodump-ng 07 min
    • Lecture4.4
      Deauthentication Attack (Disconnecting Any Device From The Network) 08 min
  • Gaining Access 1

  • Gaining Access - WEP Cracking 6

    • Lecture6.1
      Theory Behind Cracking WEP Encryption 03 min
    • Lecture6.2
      Basic Case 06 min
    • Lecture6.3
      Associating With Target Network Using Fake Authentication Attack 06 min
    • Lecture6.4
      Packet Injection – ARP Request Reply Attack 06 min
    • Lecture6.5
      Packet Injection – Korek Chopchop Attack 08 min
    • Lecture6.6
      Packet Injection – Fragmentation Attack 08 min
  • Gaining Access - WPA/WPA2 Cracking 8

    • Lecture7.1
      Introduction to WPA / WPA2 Cracking 04 min
    • Lecture7.2
      Exploiting WPS Feature 07 min
    • Lecture7.3
      How To Capture The Handshake 02 min
    • Lecture7.4
      Creating a Wordlist / Dictionary 06 min
    • Lecture7.5
      Cracking the Key Using a Wordlist Attack 03 min
    • Lecture7.6
      Cracking the Key Quicker using a Rainbow Table 07 min
    • Lecture7.7
      Cracking WPA/WPA2 Much Faster Using GPU – Part 1 07 min
    • Lecture7.8
      Cracking WPA/WPA2 Much Faster Using GPU – Part 2 11 min
  • Gaining Access - Security & Mitigation 2

    • Lecture8.1
      Securing Your Network From The Above Attacks
    • Lecture8.2
      How to Configure Wireless Security Settings To Secure Your Network 06 min
  • Post Connection Attacks 2

  • Post Connection Attacks - Information Gathering 3

    • Lecture10.1
      Discovering Connected Clients using netdiscover 03 min
    • Lecture10.2
      Gathering More Information Using Zenmap 11 min
    • Lecture10.3
      Gathering Even More Information Using Zenmap 30 min
  • Post Connections Attacks - Man In The Middle Attacks (MITM) 17

    • Lecture11.1
      ARP Poisoning Theory 06 min
    • Lecture11.2
      ARP Spoofing using arpspoof 06 min
    • Lecture11.3
      Bettercap Basics 30 min
    • Lecture11.4
      ARP Spoofing Using Bettercap 30 min
    • Lecture11.5
      Spying on Network Devices (Capturing Passwords, Visited Websites…etc) 30 min
    • Lecture11.6
      Creating Custom Spoofing Script 10 min
    • Lecture11.7
      Understanding HTTPS & How to Bypass it 06 min
    • Lecture11.8
      Bypassing HTTPS 11 min
    • Lecture11.9
      Bypassing HSTS 10 min
    • Lecture11.10
      DNS Spoofing – Redirecting Requests From One Website To Another 05 min
    • Lecture11.11
      Injecting Javascript Code 10 min
    • Lecture11.12
      Wireshark – Basic Overview & How To Use It With MITM Attacks 09 min
    • Lecture11.13
      Wireshark – Sniffing Data & Analysing Data 08 min
    • Lecture11.14
      Wireshark – Using Filters, Tracing & Dissecting Packets 30 min
    • Lecture11.15
      Wireshark – Capturing Passwords & Anything Sent By Any Device In The Network 05 min
    • Lecture11.16
      Creating a Fake Access Point – Theory 07 min
    • Lecture11.17
      Creating a Fake AP Using Mana-Toolkit 10 min
  • Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 7

    • Lecture12.1
      Bonus – Installing Veil 3.1 04 min
    • Lecture12.2
      Bonus – Veil Overview & Payloads Basics 07 min
    • Lecture12.3
      Bonus – Generating An Undetectable Backdoor Using Veil 3 10 min
    • Lecture12.4
      Bonus – Listening For Incoming Connections 07 min
    • Lecture12.5
      Bonus – Using A Basic Delivery Method To Test The Backdoor and Hack Windows 10 07 min
    • Lecture12.6
      Creating a Fake Update & Hacking Any Client in the Network 12 min
    • Lecture12.7
      Meterpreter Basics – Interacting With Hacked Clients 05 min
  • ARP Poisonning Detection & Security 2

    • Lecture13.1
      Detecting ARP Poisoning Attacks 05 min
    • Lecture13.2
      Detecting Suspicious Activities using Wireshark 06 min
  • Bonus Section 1

    • Lecture14.1
      Bonus Lecture – What’s Next?

Your instructor

Zaid Sabih

Ethical Hacker, Pentester & Computer Scientist

Zaid Al-Quraishi is an ethical hacker, computer scientist, and founder of zSecurity. He studied Computer Science at University College Dublin, graduating May 2016.Zaid has a strong background and experience in ethical hacking, starting with video tutorials in 2009 in an ethical hacking community, iSecur1ty.org. He also worked as a penetration tester (pentester) for this company.In 2013 he started teaching his first course online in Arabic which received extremely positive feedback. This motivated him to create an English version of the course. The English course became the most popular and top paid course on Udemy for almost a year, which further motivated Zaid to design and teach more courses on ethical hacking.He now offers a number of courses on ethical hacking and more than 200,000 students on Udemy and other teaching platforms such as StackSocial, StackSkills and zSecurity.Zaid says: "I just love hacking and breaking the rules but don't get me wrong, I am an ethical hacker!"