Wi-Fi Hacking with Kali

197 Enrolled
1.5 Hours
You save 92% -

22 Lessons (1.5h)

  • Basics
    History of Wi-Fi and its vulnerbility6:00
    Setting up environment for penetration testing4:23
    Installing Kali Linux2:58
    Dual boot Kali Linux with Windows5:43
    Live Boot of Kali Linux2:42
    Setting up Kali Linux in virtual box8:55
    Basic Linux commands11:44
    Special command related to hacking4:16
  • Advanced
    Gatting a Handshake and Data Capture5:55
    WEP hacking6:53
    Counter measure for WEP1:44
    Counter measure for reaver2:08
    Built-in Kali word list rockyou.txt1:52
    Using Aircrack and a Dictionary to crack a WPA Data Capture3:14
    Using Hydra to gaining access to admin login of a router5:52
    key logger Wi-Fi3:31
    Keylogger Wi-Fi counter measure1:25
    Bypassing Mac address filtering4:19
    Increasing wireless transmit power2:31

Come to Grips with One of the Most Popular Ethical Hacking Tools Around

Amit Hudar

Amit Huddar is an Internet Entrepreneur and Software Engineer. He runs his own software company "Softdust," which develops products for new technologies like wearables and other gadgets. He opted for computer science engineering in 2013 at SSIT and started his software company in his first year of engineering.

His skills include: Android app development, HTML, CSS, PHP, C, C++, JAVA, Linux, Building Custom Linux OS, Cloud Computing. Penetration testing, Kali Linux and Hacking.


Network security is an essential to any home or corporate internet connection, which is why ethical hackers are paid big bucks to identify gaps and threats that can take a network down. In this course, you'll learn how to protect WEP, WPA, and WPA2 networks by using Kali Linux, one of the most popular tools for ethical hackers. By course's end, you'll have the know-how to protect network environments like a pro.

  • Access 22 lectures & 1.5 hours of content 24/7
  • Set up a penetration testing environment
  • Learn 4 different ways to install & use Kali Linux
  • Understand how to hack WEP-protect WiFi & learn countermeasures
  • Discover how to hack WiFi using Hydra, a keylogger, or by removing devices


Details & Requirements:

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner


  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.
Your cart is empty. Continue Shopping!
Processing order...