Network Hacking Continued - Intermediate to Advanced [Video]

More Information
  • This course includes 50 detailed videos on practical attacks against Wi-Fi networks including a number of advanced practical attacks. 
  • Learn how to disconnect multiple/all clients from their networks without knowing the keyBypass MAC filtering (both black and white lists). 
  • Discover the names of hidden networks and connect to them. 
  • Crack more secure WEP implementation when SKA is used.
  • Exploit WPS on more secure routers to get the WPA/WPA2 key.Unlock WPS on some routers even if its locked. Understand how WPA/WPA2 enterprise works.
  • Gain access to networks that use WPA/WPA2 enterprise using two methods.
  • Gain access to captive portals (hotels and airport networks) using three methods.
  • Understand how a fake access point works and be able to create one manually from scratch.
  • Generate SSL certificates & use it to support HTTPS on Apache2, and much more.

Welcome to this advanced network hacking course, designed to build up on what you already know about network hacking. It's recommended that you complete the network hacking section of the author's general ethical hacking course or finish his network hacking course before starting this course. Just like all of his other courses, this course is highly practical, whilst including the theory, but, since this is an advanced courseeach attack will be broken into its smaller components in order to understand how each of these components work; by the end of the course you will be able to mix these attacks and adopt attacks to suit different situations and different scenarios, and write your own man-in-the-middle scripts to implement your own man-in-the-middle attacks. Because this course builds on what you learn in the courses mentioned above, the main sections here have similar titles but the topics covered here are more advanced. Finally, at the end of the course, you will learn how to protect yourself and your systems from these attacks. All the attacks in this course are practical attacks that work against real computers. In each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real-life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adapt them to different scenarios and different operating systems.

Style and Approach

This advanced network hacking course is designed to build upon what you already know about network hacking.

  • You will learn a number of advanced techniques to gain access to various network configurations and various network encryptions.
  • You will learn how to discover and target hidden networks t and to access secure networks without passwords.
Course Length 9 hours 59 minutes
ISBN 9781789341478
Date Of Publication 18 Apr 2018


Zaid Sabih

Zaid Sabih is an ethical hacker, a computer scientist, and the founder and CTO of zSecurity. He has good experience in ethical hacking; he started working as a pentester with iSecurity. In 2013, he started teaching his first network hacking course; this course received amazing feedback, leading him to publish a number of online ethical hacking courses, each focusing on a specific topic, all of which are dominating the ethical hacking topic on Udemy. Now Zaid has more than 300,000 students on Udemy and other teaching platforms, such as StackSocial, StackSkills, and zSecurity.