All in One Offer! | Access Unlimited Courses in any category starting at just $29. Signup today. Offer Ends in: 3 Days!

Browse Library

Get Unlimited Learning Access
3 days left at this price!
30-Day Money-Back Guarantee

It Includes

  • Get Full Access to the platform
  • Access to 16000+ online courses
  • High Quality Recorded Lectures
  • Learn Online from Mobile/PC/Tablet
  • Assignments & Projects
  • Online iLab Access
  • Certificate of Completion
  • Download for offline viewing
  • Free Instructor Support
  • Access valid for 1 user only
  • Cancel Anytime
  • Learn Network Security Testing
  • Setup your Kali Linux environment properly
  • You will learn the basics of network
  • Gather any access point information without having the key
  • Carry out several attacks without having the key
  • Learn some Linux commands
  • You will be able to deal with a lot of Kali Linux tools
  • Crack any WiFi encryption using several methods
  • Protect your WiFi network against all the attacks Learn ARP Poisoning
  • Launch ARP Poisoning attack
  • Launch (Man in the middle attack)
  • Gain access to any client account in the WiFi network
  • Detect ARP Poisoning (MITM) attack to protect yourself against it

In this course, you will start as a beginner without any previous knowledge about the hacking, this course focuses on the practical side and the theoretical side.

 In this course you will learn how to set up your Kali Linux Environment properly without any issues, and we will learn on Kali Linux 2.0 which is the newest version of offensive security Organization, then you will learn how the Devices communicate with each other, then you will go through the theory behind each method during cracking WEP and WPA2 encryption because this will help you to understand what's happening in the real world, then you will move to learn how to crack WEP/WPA2 WiFi encryption key using more than method, so if the first method didn't  work with you, you can try another one, and after cracking WEP/WPA2 encryption key you will learn how to perform a sophisticated attacks against any client in the network and this is going to be the gravest and the funniest part of this course, after all of that you will learn how to protect yourself and your accounts from these attacks, and how to prevent your WiFi Access Point against any attack .

This course is intended for beginners and professionals, if you are a beginner you will start from zero until you become a professional, and if you are a professional so this course will increase your knowledge about the hacking.

This course is divided to six parts:

  1. Preparation: In this section, you will learn how to download and setup Kali Linux 2.0 properly as a virtual machine and also how to install it as your main OS, then you'll learn how to keep it always up to date, this will help you to create your safe Environment to do any kind of Penetration Testing.
  2. Network Basics: here you will learn the basics of networks that will help you to understand what's happening in the real world before you get into network security testing.
  3. Gather AP information Before Cracking: in this section you'll learn how you can Gather information about the target Access Point such as (ESSID-BSSID-Channel-Encryption type, etc......) before cracking the password because you can't hack anything without having as much as possible of information about the target, and you'll learn how you can disconnect any client from your target network or even jam your target AP completely without having the password.
  4. Cracking WEP/WPA/WPA2 Encryption:  After gathering information about the target Access Point now you'll move to learn how you to Crack WEP/WPA/WPA2 encryption key and the theory behind each method.
  5. MITM Attack: this is the gravest and the funniest section in this course because it includes a lot of funny things that you can do once you get access into the target AP such as (playing music in the target computer, stealing the passwords, and much more you can see it in the course...) and even fully control the connected devices.
  6. Protecting yourself against these attacks: after learning all of these attacks now it's time to learn how to  protect yourself and your accounts against all of the previous attacks starting from cracking the WiFi AP key and ending with MITM Attacks, so you'll learn how to prevent yourself and your WiFi AP and your accounts from these attacks.

NOTICE: All the videos are downloadable.

My Recommendation is these WiFi Cards:

  • Realtek RTL8187L


  • These Attacks does work against any device such as (Tablets, Laptops, and Smartphones etc....)  and against any operating system (IOS, Android, Windows, Linux, Mac OS, etc....).
  •  You must practice what you learned to become an advanced level, because this course focuses on both practical and theoretical side. 
  • This course is going to be always up to date.
  • This course is only for Ethical purposes.
  • If you have any question or any problem, you can send a message to me and i'll be glad to response.
  • After finishing this course, you will get a certificate from Learnfly
  • All the people who enrolled in this course will get discounts for future courses

  • PC or Laptop
  • WiFi Card (supports injection)
  • Kali Linux Distribution
  • Basic IT skills
  • This course is for the people who want to do a Penetration Testing against a Specific WiFi Networks
  • for the people who wants to protect themselves against these attacks
View More...
  • Section 1 : Introduction 1 Lectures 00:02:02

    • Lecture 1 :
  • Section 2 : Setup your own Lab Environment 6 Lectures 00:19:10

    • Lecture 1 :
    • Installing Kali Linux 2.0 as ISO file
    • Lecture 2 :
    • Installing Kali Linux 2.0 as a Virtual Machine (VirtualBox)
    • Lecture 3 :
    • Installing Kali Linux 2.0 as a Virtual Machine (VMware)
    • Lecture 4 :
    • Setup Windows as a Virtual Machine
    • Lecture 5 :
    • Connect Wi-Fi Card to your Virtual Machine
    • Lecture 6 :
    • Updating and Upgrade Kali Linux 2.0
  • Section 3 : Network Basics 3 Lectures 00:13:28

    • Lecture 1 :
    • Network Basics Explain
    • Lecture 2 :
    • What is the Mac address and how to change it
    • Lecture 3 :
    • Enabling Monitor mode on your Wi-Fi Card
  • Section 4 : Pre-Connection Attacks 6 Lectures 00:18:22

    • Lecture 1 :
    • Inroduction
    • Lecture 2 :
    • Packet Sniffing Basics Using Airodump-ng
    • Lecture 3 :
    • Capture a Specific Wi-Fi network Packets
    • Lecture 4 :
    • Disconnect any Client from Wi-Fi Access Point
    • Lecture 5 :
    • Scan the Hidden Wi-Fi Access points
    • Lecture 6 :
    • Jamming any Wi-Fi Access Point
  • Section 5 : Cracking WEP Encryption 7 Lectures 00:34:14

    • Lecture 1 :
    • Introduction
    • Lecture 2 :
    • Cracking WEP Encryption Explain
    • Lecture 3 :
    • Cracking WEP Encryption Methods
    • Lecture 4 :
    • Cracking WEP Encryption Basic
    • Lecture 5 :
    • Cracking WEP using ARP Request Replay Attack
    • Lecture 6 :
    • Cracking WEP using Hirte Attack
    • Lecture 7 :
    • Fake Authentication Attack
  • Section 6 : Cracking WPA2-WPA Encryptions 11 Lectures 00:58:19

    • Lecture 1 :
    • Cracking WPA2 Encryption Explain
    • Lecture 2 :
    • Cracking WPA2 Methods
    • Lecture 3 :
    • Cracking WPA2 using WPS Feature
    • Lecture 4 :
    • Capturing the Handshake
    • Lecture 5 :
    • Creating your own Wordlist
    • Lecture 6 :
    • Cracking WPA2 using Dictionary Attack
    • Lecture 7 :
    • Cracking WPA2 using Bruteforce Attack
    • Lecture 8 :
    • Cracking WPA2 Rainbow Table
    • Lecture 9 :
    • Cracking WPA2 using Evil Twin Attack
    • Lecture 10 :
    • Obtaining Username and Password of the Target Router
    • Lecture 11 :
    • Cracking WPA2 much faster using your (GPU)
  • Section 7 : Man in the Middle Attacks 16 Lectures 01:26:56

    • Lecture 1 :
    • Introduction
    • Lecture 2 :
    • Information Gathering
    • Lecture 3 :
    • Gather detailed information about the clients
    • Lecture 4 :
    • Man in the middle attack explain
    • Lecture 5 :
    • ARP Spoof Attack
    • Lecture 6 :
    • Capturing the Target Login Credentials
    • Lecture 7 :
    • Bypassing SSL Certificate
    • Lecture 8 :
    • Redirect any client from to any website
    • Lecture 9 :
    • Stealing the Session Cookies
    • Lecture 10 :
    • Capture a screenshot from the target browser
    • Lecture 11 :
    • Injecting a keylogger into the target webpage
    • Lecture 12 :
    • Capturing images from the network traffic
    • Lecture 13 :
    • Injecting html file and flip the images in the target browser
    • Lecture 14 :
    • Injecting JavaScript URL and Hooking the client’s with BeEF
    • Lecture 15 :
    • Stealing the Target Social Accounts with BeEF Project
    • Lecture 16 :
    • Having Fun with BeEF Project
  • Section 8 : Fully Accessing the Connected Clients 5 Lectures 00:26:45

    • Lecture 1 :
    • Creating an encrypted Backdoor
    • Lecture 2 :
    • Testing the Backdoor in the Target Machine
    • Lecture 3 :
    • Creating a Fake Browser update to Compromise any Client
    • Lecture 4 :
    • Interact with the Target Operating System (Part 2)
    • Lecture 5 :
    • Interact with the Target Operating System (Part 1)
  • Section 9 : Protect your Wi-Fi AP Against all the Previous Attacks 5 Lectures 00:28:39

    • Lecture 1 :
    • Protect your WiFi Access Point from Hacking
    • Lecture 2 :
    • Detect ARP Poisoning Attack (1st Method)
    • Lecture 3 :
    • Detect ARP Poisoning Attack (2nd Method)
    • Lecture 4 :
    • Prevent your ARP Table from Poisoning
    • Lecture 5 :
    • Detect and Kill any Active Meterpreter Session
  • Section 10 : Extras 1 Lectures 00:06:55

    • Lecture 1 :
    • Disconnecting Paired Bluetooth Devices
  • How do i access the course after purchase?

    Once you purchase a course (Single course or Subscription), you will be able to access the courses instantly online by logging into your account. Use the user name & password that you created while signing up. Once logged in, you can go to the "My Courses" section to access your course.
  • Are these video based online self-learning courses?

    Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic.
  • Can i play & pause the course as per my convenience?

    Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on.
  • How do i contact the instructor for any doubts or questions?

    Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want.
  • Do i need a pc to access the course or can i do it on mobile & tablet as well?

    Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly.
  • Do i get any certification after completing the course?

    Yes. Once you succesfully complete any course on Learnfly marketplace, you get a certiifcate of course completion emailed to you within 24 hours with your name & the Learnfly badge. You can definately brag about it & share it on your social media or with friends as one of your achievement. Click here to view the sample certificate Click Here
  • For how long can i access my course after the purchase?

    If you buy a single course, that course is accessible to you for a lifetime. If you go for a premium subcription, you can access all the courses on Learnfly marketplace till your subscription is Active.
  • Whats the difference between Single Course Purchase & Go Premium option?

    With Single Course Purchase, you only get an access of one single course. Whereas, with premium monhtly or annual subscription, you can access all the existing or new courses on learnfly marketplace. You can decide what option suits you the best and accordingly you can make your purchase.
  • Is there any free trial?

    Currently, we don't have any free trial but it may be available in near future.
  • What is the refund policy?

    We would hate you to leave us. However, if you are not satisfied, you can ask for a full refund within 30 days & we will be happy to assist you further.

Saad Sarraj,

My Name is Saad Sarraj, I am an Ethical Hacker who is trying to keep the internet more secure. I have a very good Experience in Penetration Testing, I started in this field since 2012, then I have created my own website that covers subjects in IT in general and Cyber Security in particular then I made a YouTube channel that includes many tips and tricks in using Linux OS and Windows OS, I am always focusing on the practical side in producing videos without neglecting the theory behind every single (attack, technique, idea), I am sharing my experience with you from what I previously learned.
View More...
  • learn-nxtgen-hacking-with-technology

    Learn NxtGen Hacking with Technolog...

    By : Gopikrishna C

    Lecture 80
  • tcp-ip-the-complete-course

    TCP/IP: The Complete Course

    By : Lazaro (Laz) Diaz

    Lecture 17
  • voip-configuration-and-attacking-hacking

    VoIP Configuration and Attacking (H...

    By : Arpit Mittal

    Lecture 6
  • cissp-certification-introduction

    CISSP- Certification Introduction


    Lecture 18
  • practical-blockchain-smart-contracts-ethereum-solidity

    Practical Blockchain & Smart Contra...

    By : Abhilash Nelson

    Lecture 40
  • complete-ethical-hacking-penetration-testing-for-web-apps

    Complete Ethical Hacking & Penetrat...

    By : Abhilash Nelson

    Lecture 30
Signup & Continue Checkout
By signing up, you agree to our Terms of Use and Privacy Policy
Create New Password
Enter your email address and we'll send you a link to reset your password.