Wireless Penetration Testing with Kali Linux & Raspberry Pi

Learn practical wireless penetration testing techniques using Kali Linux and Raspberry Pi, from beginner to advanced levels, and protect your network from hackers.

  • Overview
  • Curriculum
  • Instructor
  • Review

Brief Summary

This course is a hands-on journey into wireless penetration testing using Raspberry Pi and Kali Linux. Starting from the basics, it guides you through setting up your lab and reveals how to identify and protect against hacking attacks targeting your network.

Key Points

  • Use Raspberry Pi for wireless penetration testing
  • Learn practical and theoretical aspects of hacking
  • Set up a lab and install necessary software
  • Understand wireless network vulnerabilities and protections
  • Perform real-world hacking attacks in a controlled environment

Learning Outcomes

  • Set up a penetration testing lab on Raspberry Pi or virtual machine
  • Identify and exploit vulnerabilities in wireless networks
  • Understand how hackers operate and how to defend against them
  • Gain practical experience with penetration testing tools
  • Enhance your knowledge of network and systems security

About This Course

Use this small but powerful Raspberry Pi device in order to perform pen testing on your network or for clients.

*** 10/2017 Closed Captions (CC) have been added to the Course ***

Welcome to my course on Wireless Penetration Testing with Kali Linux & Raspberry Pi!

In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking.

This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine.

Once you understand how wireless networks are working, we will discuss about how these can be exploited by hackers and what we can do to protect them. This course will take you from a beginner to a more advanced level -- by the time you will complete the course, you will be able to identify the hacking attacks against your network and take the necessary steps to protect it. We will use the same tools that hackers are using in order to protect our networks. All the attacks explained in this course are launched against real devices in my lab.

The course is divided into two main sections:

In the first section, we will discuss about installing the penetration tools on our Raspberry Pi device. In case you don’t want to use a Raspberry Pi, I will explain how to install the pen tools on a virtual machine on your PC or Mac. Next we’ll talk about setting up the wireless adapter and prepare for the actual hack.

In the second section, we will take a look at several hacking attacks and ways to protect our network from these attacks. The hacking attacks are so powerful that they can disrupt our network or compromise it at high level. Topics like bypassing MAC address filtering, shared key authentication, WEP and WAP will be presented step by step.

The course will be completed with a discussion about the techniques that hackers are using to penetrate wireless networks and what we can do to stop them.

This course is an excellent introduction to Network and Systems security. We will use a Raspberry Pi device throughout this course but you can also follow along by installing Kali Linux on your computer, a process described in the course also.

Ever wanted to know how hackers are breaking into your network and what you can do to stop them? Then this course is for you!

We will play the role of a Pen Tester or White Hat Hacker in order to discover network and system vulnerabilities and then see how we can protect against them.

Scan your network for vulnerabilities before hackers are taking action against your system!

Learn how to protect against common vulnerabilities that are present in Operating Systems and how to better understand how Computer Security works.

Don't be caught off-guard and protect your network before hackers discovers the vulnerabilities in your system.

Take action today!

NOTE: This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.

  • Learn how to protect your Wireless Network from hackers

  • Discover how hackers are breaking into your network and what you can do about this

  • Better understand the functionality of computer networks

Instructor

Profile photo of Cristian Gradisteanu
Cristian Gradisteanu

As a software developer, I am responsible for the development of management software products produced by the company. My area of expertise includes programming languages like Java, Objective-C, C#, C++, PHP, Ruby and system administration. With more than 15 years of Desktop software development experience, I discovered that mobiles application programming is something that I would love to do for...

Review
4.9 course rating
4K ratings
ui-avatar of Tim Shaw
Tim S.
4.0
6 years ago

The course was easy to follow and understand. The instructor made the class easy with real world examples

  • Helpful
  • Not helpful
ui-avatar of Donald Merrell
Donald M.
1.0
7 years ago

Christian is knowledgeable but not a good choice for a narrator. He is too hard to understand and has no enthusiasm.

  • Helpful
  • Not helpful
ui-avatar of Yves Perron
Yves P.
5.0
7 years ago

Very interesting course about pen testing but the raspberry pi is not the perfect tool for that!!

  • Helpful
  • Not helpful
ui-avatar of Chris Arnold
Chris A.
5.0
7 years ago

The instructor does an excellent job of walking you through each step.

  • Helpful
  • Not helpful
ui-avatar of Phuong Huynh
Phuong H.
5.0
7 years ago

Easy to follow!

  • Helpful
  • Not helpful
ui-avatar of Gustavo Simonetti
Gustavo S.
5.0
7 years ago

Uma boa visão sobre wireless pentest aplicável não apenas ao raspberry pi. Curso bem didático, com explicações bem concisas. Atende bem ao que promete.

  • Helpful
  • Not helpful
ui-avatar of John Sanga
John S.
5.0
7 years ago

Great training!!! It was presented in a well organized manner and allowed me to take notes. I would recommend this course to anyone interested in using Kali Linux on the Raspberry PI for wireless pen testing.

  • Helpful
  • Not helpful
ui-avatar of Jeremy Gagne
Jeremy G.
3.0
7 years ago

Getting better

  • Helpful
  • Not helpful
ui-avatar of Tim Erickson
Tim E.
5.0
7 years ago

informative with a good pace

  • Helpful
  • Not helpful
ui-avatar of Arturs Stay
Arturs S.
5.0
7 years ago

Very good and very usefull material

  • Helpful
  • Not helpful
Leave A Reply

Your email address will not be published. Required fields are marked *

Ratings

Courses You May Like

Lorem ipsum dolor sit amet elit
Show More Courses