UDEMY
UDEMY Logo

Network Hacking Continued - Intermediate to Advanced 

  • Offered byUDEMY

Network Hacking Continued - Intermediate to Advanced
 at 
UDEMY 
Overview

Upskilling is a better roadmap to success. Enroll in this course to learn critical principles of Ethical Hacking through real-life case studies & examples

Duration

6 hours

Mode of learning

Online

Difficulty level

Beginner

Official Website

Go to Website External Link Icon

Credential

Certificate

Network Hacking Continued - Intermediate to Advanced
 at 
UDEMY 
Highlights

  • Earn a Certificate of completion from Udemy on successful course completion
  • Earn a certificate of learning on course completion
  • Enroll for free
  • Pay only for getting a certificate of completion
  • 10 hours on-demand video
Read more
Details Icon

Network Hacking Continued - Intermediate to Advanced
 at 
UDEMY 
Course details

Who should do this course?
  • Anybody interested in learning website & web application hacking / penetration testing
  • Anybody interested in becoming a bug bounty hunter
  • Anybody interested website hacking
  • Anybody interested in learning how to secure websites & web applications from hacker
  • Web developers so they can create secure web application & secure their existing ones
  • Web admins so they can secure their websites
What are the course deliverables?
  • 90+ Videos to take you from a beginner to advanced in website hacking
  • Create a hacking lab & needed software (on Windows, OS X and Linux)
  • Become a bug bounty hunters & discover bug bounty bugs!
  • Discover, exploit and mitigate a number of dangerous web vulnerabilities
  • Exploit these vulnerabilities to hack into web servers
  • Bypass security & advanced exploitation of these vulnerabilities
  • Advanced post exploitation - hack other websites on the same server, dump the database, privilege escalation....etc
  • Bypass security & filters
  • Intercept requests using a proxy
  • Adopt SQL queries to discover and exploit SQL injections in secure pages
  • Gain full control over target server using SQL injections.
More about this course
  • Welcome to this advanced network hacking course, this course is designed to build up on what you already know about network hacking, therefore I recommend finishing the network hacking section of my general ethical hacking course or finishing my network hacking course before starting this one
  • Just like all of my other courses, this course is highly practical, but it will not neglect the theory, since this is an advanced course we will be breaking each attack into its smaller components and understand how each of these components work, therefore by the end of the course you will be able to mix these attacks and adopt them to suit different situations and different scenarios, you will also be able to write your own man in the middle scripts to implement your own attacks.
Read more

Network Hacking Continued - Intermediate to Advanced
 at 
UDEMY 
Curriculum

Course Overview

Pre-connection Attacks Overview

Spoofing Mac Address Manually

Targeting 5 GHz Networks

Deauthenticating a Client From Protected WiFi Networks

Deauthenticating Multiple Clients From Protected WiFi Networks

Deauthenticating All Clients From Protected WiFi Network

Deauthenticating Same Client From Multiple Bands or Networks

Gaining Access Overview

Discovering Hidden Networks

Connecting To Hidden Networks

Bypassing Mac Filtering (Blacklists & Whitelists)

Cracking SKA WEP Networks

Securing Systems From The Above Attacks

Sniffing Captive Portal Login Information Using ARP Spoofing

Creating a Fake Captive Portal - Introduction

Creating Login Page - Cloning a Login Page

Creating Login Page - Fixing Relative Links

Creating Login Page - Adding Form Tag

Creating Login Page - Adding Submit Button

Preparing Computer To Run Fake Captive Portal

Bypassing "Failed to associate" Issue

Bypassing 0x3 and 0x4 Errors

WPS Lock - What Is It & How To Bypass It

Unlocking WPS

Saving Cracking Progress

Using Huge Wordlists Without Wasting Storage

Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage

Cracking WPA/WPA2 Much Faster Using GPU - Part 1

Cracking WPA/WPA2 Much Faster Using GPU - Part 2

Other courses offered by UDEMY

549
50 hours
– / –
3 K
10 hours
– / –
549
4 hours
– / –
599
10 hours
– / –
View Other 2346 CoursesRight Arrow Icon
qna

Network Hacking Continued - Intermediate to Advanced
 at 
UDEMY 

Student Forum

chatAnything you would want to ask experts?
Write here...