تعلم قرصنة الشبكة من الصفر (واي فاي وسلكي)

0

Udemy Review

الموقع

Online(رابط الدورة)

التاريخ

عند الطلب

أقسام الدورات

نظم معلومات و تكنولوجيا

الشهادة

Yes(Certificate of completion)

اللغة

الإنجليزية

رسوم الدورة

(التحقق من صفحة الدورة لآخر سعر) 1827.91 دولار أمريكي

عدد الحضور

غير محدود

المهارات المكتسبة

  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network.
اسم مقدم الدورة Udemy
مجالات التدريب
  • تجارة و إدارة
  • التسويق الرقمي
  • الموضة و الجمال
  • إنسانيات
  • نظم معلومات و تكنولوجيا
  • لغات
  • الرياضيات والعلوم و الهندسة
  • التصوير والمرئيات
  • طبي , لياقة ورعاية صحية
  • تطوير الذات
  • السياسة و الاقتصاد
  • علوم الاجتماع
  • الخدمات اللوجستية و سلاسل الإمداد
  • التدريب والتعليم
  • السفر و السياحة
  • أخرى
موقعك الإلكتروني (URL) www.udemy.com
حول المزود

Udemy.com is an online learning platform aimed at professional adults and students.

Udemy, a portmanteau of you + academy, has more than 30 million students and 50,000 instructors teaching courses in over 60 languages. There have been over 245 million course enrollments. Students and instructors come from 190+ countries and 2/3 of students are located outside of the U.S. Udemy also has over 4,000 enterprise customers and 80% of Fortune 100 companies use Udemy for employee upskilling (Udemy for Business). Students take courses largely as a means of improving job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.

Udemy serves as a platform that allows instructors to build online courses on topics of their choosing. Using Udemy's course development tools they can upload video, PowerPoint presentations, PDFs, audio, zip files and live classes to create courses.[citation needed] Instructors can also engage and interact with users via online discussion boards.

Courses are offered across a breadth of categories, including business and entrepreneurship, academics, the arts, health and fitness, language, music, and technology. Most classes are in practical subjects such as Excel software or using an iPhone camera. Udemy also offers Udemy for Business, enabling businesses access to a targeted suite of over 3,000 training courses on topics from digital marketing tactics to office productivity, designmanagementprogramming, and more. With Udemy for Business, organizations can also create custom learning portals for corporate training.

 

this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.


This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.




The Course is Divided into three main sections: 


Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode  and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn  how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.


Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.


Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

المشاركة مع...