Learn Network Hacking From Scratch (WiFi & Wired) (Udemy.com)

Learn how to hack both WiFi and wired networks like black hat hackers, and learn how to secure them from these attacks.

Created by: Zaid Sabih

Produced in 2022

icon
What you will learn

  • 60+ detailed videos about practical networks attacks
  • Control connections of clients around you without knowing the password.
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Hack any computer on the same network.
  • Intercept data and spy on all on the network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • A number of practical attacks that can be used without knowing the key to the target network
  • ARP Spoofing/ARP Poisonning
  • Launch Various Man In The Middle attacks.
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • Detect ARP poisoning and protect your self and your network against it.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
  • Combine individual attacks to launch even more powerful attacks.
  • <

icon
Quality Score

Content Quality
/
Video Quality
/
Qualified Instructor
/
Course Pace
/
Course Depth & Coverage
/

Overall Score : 0 / 100

icon
Live Chat with CourseDuck's Co-Founder for Help

Need help deciding on a other course? Or looking for more detail on Zaid Sabih's Learn Network Hacking From Scratch (WiFi & Wired)? Feel free to chat below.
Join CourseDuck's Online Learning Discord Community

icon
Course Description

Welcome to this comprehensive course on Network Hacking!
In this course, you will start as abeginnerwith no previous knowledge about penetration testing orhacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.
This course is focused on thepractical side ofpenetrationtesting without neglecting the theory. Before jumping into hacking youwill first learn how toset up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks andhow devices communicate with each other,then you will learn how toexploit this method of communication to carry out a number of powerful attacks. The Course is Divided into three main sections: Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie:
deny/allow devices from connecting to networks) without knowing the password of the target network.
Gaining Access: Now that you gathered information aboutthe networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.
Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number ofpowerful techniquesthat allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....
etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how tocreate a fake WiFi network,attract users to connect to it and use all of the above techniques against the connected clients.
All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...
etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...
ect.). ineach technique you willunderstand the theory behindit andhow it works, then you'll learn how to use that technique in areal life scenario, so by the end of the course you'll be able tomodify these techniquesorcombinethemto come up withmore powerful attacksand adopt them todifferent scenarios and different operating systems.
With this course you'll get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you within 15 hours.
Notes: This course is created for educational purposes only andall the attacks are launched in my own lab or against devices that I have permission to test.
This course is totally a product of Zaid Sabih & zSecurity, no other organization is associated for certification exam for the same. Although, you will receive Course Completion Certification from Udemy, apart from that No OTHER ORGANIZATION IS INVOLVED. Who this course is for:
Anybody who is interested in learning about network penetration testingAnybody interested into learning how to protect networks from hackers.

*Some courses are excluded from this sale. Coupon not working? If the link above doesn't drop prices, clear the cookies in your browser and then click this link here.
Also, you may need to apply the coupon code directly on the cart page to get the discount.

Coupon Code

icon
Instructor Details

Zaid Sabih

My name is Zaid Al-Quraishi, I am an ethical hacker, a computer scientist, and the founder and CEO of zSecurity. I just love hacking and breaking the rules, but dont get me wrong as I said I am an ethical hacker.
I have tremendous experience in ethical hacking, I started making video tutorials back in 2009 in an ethical hacking community (iSecuri1ty), I also worked as a pentester for the same company. In 2013 I started teaching my first course live and online, this course received amazing feedback which motivated me to publish it on Udemy.
This course became the most popular and the top paid course in Udemy for almost a year, this motivated me to make more courses, now I have a number of ethical hacking courses, each focusing on a specific field, dominating the ethical hacking topic on Udemy.
Now I have more than 350,000 students on Udemy and other teaching platforms such as StackSocial, StackSkills and zSecurity.

icon
Reviews

0.0

0 total reviews

5 star 4 star 3 star 2 star 1 star
% Complete
% Complete
% Complete
% Complete
% Complete

By Peter Vorwerk on 10/23/2020

I needed to learn computer security skills ethically without ever stepping outside of legal boundaries. This course allowed me to rapidly get going on and continue my journey to becoming a certified security professional.

By Chris Obana on 8/13/2020

Truly a thorough course that kept my mind worked out. Taught in a manner that left little to question as to why and how certain things were done as they were. Super knowledgeable and poignant.

By Alvin Galvez on 7/3/2020

Best Practical Course when youre preparing for the pentest+ . thanks Zaid

An impressive course with detailed information about ethical network hacking as well as a knowledgeable and teachable tutor and helpful assistants.

By Kervan K Naicker on 4/18/2020

The teaching instruction provided by Zaid was easy to follow and put into practice. The teaching assistants were equally good and very prompt when answering and providing solutions to problems. The course content met my expectations and does inspire one to want to learn more and progress to the intermediate levels of ethical hacking and explore other facets of hacking and security. Thank you Zaid and team for a job well done!

By Kahlid Benson on 7/13/2020

Excellent lecture.. Came across some issue but was able to overcome them with the help of the assistants, YouTube, and Google.

By Mark Burford on 5/6/2020

Really good, lots to learn and do, in good well planned lessons, Q&A prompt and well managed, ordered and looking forward to the other courses offered by Zaid

By Lyssa Jean Corlett on 9/8/2020

Great course, really easy to follow and always kept up to date with the latest versions of software. I would highly recommend this course to anyone interested in ethical hacking. I will definitely be checking out the other courses they do!

By Vishal Kr Sharma on 9/7/2020

Very Nicely Explained every core thing of this course.. love the way he taught me.

By Alejandro Snchez on 8/2/2020

The course is not what I expected ... 1 dictionary methods, creating a complex dictionary takes days, even weeks, making the method obsolete.
2. Following step by step no The DNS Spoof method works I tried with several usual pages from my country and it does not load them which makes the method obsolete 3. In the method from https to http following step by step and still clearing the cache in each module of the course, I looked at the question and answer section, and I noticed that 90% of people did not work with the method either, which makes the following modules obsolete
4. The instructor does not respond

Thank you thought the course was well done and at a good pace. The topics flowed well and in a consistent manner.

By Julio Rivera on 6/4/2020

Zaid you are AWESOME I love your courses. I have learn a lot from your courses, I really love your content :) iwconfig