Use this small but powerful Raspberry Pi device in order to perform pen testing on your network or for clients.
Are you into network security or just want to get started in this field?
This course is an excellent introduction to Network and Systems security. We will use a Raspberry Pi device throughout this course but you can also follow along by installing Kali Linux on your computer, a process described in the course also.
Ever wanted to know how hackers are breaking into your network and what you can do to stop them? Then this course is right for you!
We will play the role of a Pen Tester or White Hat Hacker in order to discover network and system vulnerabilities and then see how we can protect against them. Scan your network for vulnerabilities before hackers are taking action against your system. Learn how to protect against common vulnerabilities that are present in Operating Systems and how to better understand how Computer Security works.
Don’t be caught off-guard and protect your network before hackers discovers the vulnerabilities in your system.
├── 01 Introduction
│ ├── 001 Course Introduction.mp4
│ ├── 002 Hardware Requirements.mp4
│ ├── 003 Downloading and installing Kali Linux on Raspberry Pi.mp4
│ ├── 004 Downloading and installing Kali Linux in VirtualBox on Windows.mp4
│ ├── 005 Downloading and installing Kali Linux in VirtualBox on Mac OS X.mp4
│ ├── 006 Connecting to Kali Linux for the first time – VirtualBox.mp4
│ ├── 007 Connecting to Kali Linux for the first time – Raspberry Pi.mp4
│ ├── 008 Updating Kali Linux.mp4
│ ├── 009 Setting up your wireless adapter.mp4
│ └── 010 Conclusions.mp4
└── 02 Bypassing Wireless LAN Authentication
├── 001 Bypassing Hidden SSIDs.mp4
├── 002 Bypassing MAC Address filtering.mp4
├── 003 Bypassing Shared Key Authentication.mp4
├── 004 Bypassing Open System Authentication.mp4
├── 005 Cracking WEP.mp4
├── 006 Cracking WEP with fern-wifi-cracker.mp4
├── 007 Cracking WPA WPA2.mp4
├── 008 Cracking WPA2 with Wifite and Cowpatty.mp4
├── 009 Connecting to a WPAWPA2 wireless network.mp4
├── 010 MITM – Man in the middle attack.mp4
├── 011 MITM with Ettercap.mp4
└── 012 Conclusions.mp4