Skip to content

Wi-Fi Hacking and Wireless Penetration Testing Course

WEP, WPA/WPA2, WPS Cracking, Wifi Recon & Password cracking.Learn how to hack Wi-Fi from real-world penetration tester!

Provided by Oak Academy

Summary

Price
£49 inc VAT
Study method
Online, On Demand What's this?
Duration
4.3 hours · Self-paced
Qualification
No formal qualification
Certificates
  • Reed courses certificate of completion - Free

2 students purchased this course

Add to basket or enquire

Overview

Hi there,
Welcome to Wi-Fi Hacking and Wireless Penetration Testing Course
WEP, WPA/WPA2, WPS Cracking, Wifi Recon & Password cracking.Learn how to hack Wi-Fi from real-world penetration tester!

Ethical hacking is a whole new technology in itself. The techniques of hacking are rapidly growing in numbers with hackers every day coming up with new ideas to steal our personal data. One such widely preferred ways of hacking is Wi-Fi hacking.

Wi-Fi hacking is easier than hacking a device connected to that WiFi. There are many free tools that can hack the less secure WiFi router. Apart from this, there are also advanced tools that work on backtrack and can even hack Wi-Fi router with high security.

In this course, you will learn how to crack the key and get the password to WiFi networks whether they use WEP, WPA, or even WPA2. While you are learning ethically hack you will also learn how to secure networks from hackers.

This course is for all levels. We will take you from beginner to advance level. You will learn step-by-step with hands-on demonstrations.
Whether you want to get your first job in IT security, become a white hat hacker, or prepare to check the security of your own home network, Oak Academy offers practical and accessible ethical hacking courses to help keep your networks safe from cybercriminals.

Penetration testing skills make you a more marketable IT tech. Understanding how to exploit servers, networks, and applications means that you will also be able to better prevent malicious exploitation. From website and network hacking, to pen testing in Python and Metasploit, Reed has a course for you.

At the end of the course you will learn;

  • Wireless Operating Modes: Ad-hoc, Infrastructure, Monitor modes.

  • Wireless Packet Types

  • MAC Frame Structure

  • Analysing Packet Types with Wireshark

  • Wi-Fi Network Interaction, Authentication MethodsWEP vs WPA/WPA2

  • WPA2 4-Way Handshake

  • WPA Personal and Enterprise

  • Wireless Reconnaissance with Bettercap

  • Wardriving with Kismet, Mapping with Google Earth

  • Rogue Access Points with Airbase-ng, Wifi Pumpkin 3, Fluxion

  • Handshake Snooper and Captive Portal Attack with Fluxion

  • Evil Twin Attack

  • WEP Cracking with Client and Clientless Networks

  • Fake Authentication Attack

  • Deauthentication Attack with Bettercap

  • ARP Request Replay Attack

  • Fragmentation Attack

  • ChopChop Attack

  • Cracking WPA/WPA2 with Aircrack-ng, John The Ripper, Cowpatty, Wifite 2

  • Passwordlists

  • WPA/WPA2 Cracking using GPUs with Hashcat

  • Key Reinstallation Attacks (KRACK)

  • WPS PIN Attacks and more...

  • Network Security

  • ethical

  • Ethical Intelligence

  • nmap nessus

  • nmap course

  • nmap metaspolit

  • Complete nmap

  • Kali linux nmap

  • ethical hacking

  • penetration testing

  • bug bounty

  • hack

  • cyber security

  • kali linux

  • android hacking

  • network security

  • hacking

  • security

  • security testing

  • nmap

  • metasploit

  • metasploit framework

  • penetration testing

  • oscp

  • security testing

  • windows hacking

  • exploit

  • bug bounty

  • bug bounty hunting

  • website hacking

  • web hacking

  • pentest+

  • pentest plus

  • OSINT (Open Source Intelligent )

  • social engineering

  • phishing

  • social engineering tool kit

  • wifi hacking wireless hacking password cracking wireless cracking wifi Wi-Fi Hacking and Wireless Penetration wifi hacking and wireless penetration testing wi-fi hacking muharrem aydin hacking kismet wireless hack wifi password hacking wireless penetration wifi cracking wifi password wps wireless penetration test wpa2 wifi hack recon wifi crack wifi hacking course hashcat wi-fi hacking wifi wifi penetration hack wifi wireless penetration testing wi-fi password penetration testing course offensive resources learn wifi hacking wi-fi hacking and wireless cracking wifi crack wifi evil twin attack

No prior knowledge is needed!

It doesn't need any prior knowledge to learn Ethical Hacking

This course starts with very basics. First, you will learn how to install the tools, some terminology. Then the show will start and you will learn everything with hands-on practices. I'll also teach you the best practices and shortcuts.

Step-by-Step Way, Simple and Easy With Exercises

By the end of the course, you’ll have a firm understanding of the Wifi Hacking and valuable insights on how things work under the hood and you'll also be very confident in cracking the key and get the password to WiFi networks, and hungry to learn more. The good news is since the Free and popular tools are used you don’t need to buy any tool or application.

You'll also get:

Lifetime Access to The Course

Fast & Friendly Support in the Q&A section

Dive in now to my Wi-Fi Hacking and Penetration Testing.

Certificates

Reed courses certificate of completion

Digital certificate - Included

Will be downloadable when all lectures have been completed

Curriculum

9
sections
67
lectures
4h 18m
total
    • 1: Wi-Fi Hacking and Wireless Penetration Testing Course 00:57
    • 2: Introduction to Wi-Fi Hacking and Wireless Penetration Testing Course 04:06
    • 3: FAQ regarding Ethical Hacking 03:00
    • 4: FAQ regarding Penetration Testing 02:00
    • 5: Hardware and Software Requirements 07:03
    • 6: Virtualisation Platform 01:00
    • 7: Enabling Virtualization (VT-x or AMD-V) in BIOS 01:00
    • 8: Lab's Archtitecture Diagram 03:24
    • 9: Using VirtualBox vs VMware 01:00
    • 10: VirtualBox: Install & Run 05:03
    • 11: Important Note before Kali Installation 01:00
    • 12: Installing Kali From VMware File for VMware - Step 1 03:13
    • 13: Installing Kali From VMware File for VMware - Step 2 04:47
    • 14: Installing Kali From VMware File for VMware - Step3 04:12
    • 15: Installing Kali From ISO File for VMware - Step 1 01:27
    • 16: Installing Kali From ISO File for VMware - Step2 06:49
    • 17: Installing Kali From ISO File for VMware - Step 3 01:47
    • 18: Installing Kali From ISO File for Virtualbox - Step1 01:27
    • 19: Installing Kali From ISO File for VirtualBox - Step2 06:50
    • 20: Installing Kali From OVA File for VirtualBox - Step 1 03:14
    • 21: Installing Kali From OVA File for VirtualBox - Step 2 06:45
    • 22: Installing Kali From OVA File for VirtualBox - Step 3 04:12
    • 23: Updates for Kali Linux 2021.4 01:00
    • 24: Wi-Fi Adapter Settings 06:17
    • 25: IEEE-802.11 03:54
    • 26: Basic Terminologies and Concepts 04:51
    • 27: Wireless Operating Modes 06:11
    • 28: MAC Frame Structure 02:58
    • 29: Wireless Packet Types 05:22
    • 30: Wireshark: Analysing Packet Types 06:33
    • 31: Wi-Fi Network Interaction 05:04
    • 32: Wireless Encryption Protocols: WEP vs. WPA 03:58
    • 33: WPA 4-Way Handshake 05:46
    • 34: WPA2 Personal and Enterprise 03:16
    • 35: Wireshark: WEP and WPA 01:10
    • 36: Wi-Fi Protected Setup (WPS) 03:50
    • 37: quiz 01:00
    • 38: Wireless Recon with Bettercap 03:35
    • 39: Wardriving with Kismet: Installation 05:56
    • 40: Wardriving with Kismet: Configuration 06:45
    • 41: Wardriving with Kismet: Mapping 04:50
    • 42: Airbase-ng 05:47
    • 43: Evil Twin Attack 06:42
    • 44: Wifi Pumpkin 3 07:31
    • 45: Fluxion: Installation 02:50
    • 46: Fluxion: Handshake Snooper Attack 04:54
    • 47: Fluxion: Captive Portal Attack 05:29
    • 48: quiz 01:00
    • 49: WEP Cracking - Preparing Attacks 02:49
    • 50: WEP Cracking - Fake Authentication Attack 03:51
    • 51: WEP Cracking - Deauthentication Attack 02:59
    • 52: WEP Cracking - Deauthentication Attack with Bettercap 01:32
    • 53: WEP Cracking - ARP Request Replay Attack 04:15
    • 54: WEP Cracking - Fragmentation Attack 05:10
    • 55: WEP Cracking - ChopChop Attack 03:48
    • 56: quiz 01:00
    • 57: WPA/WPA2 Cracking - Introduction 05:13
    • 58: WPA/WPA2 Cracking - Aircrack-ng 03:57
    • 59: WPA/WPA2 Cracking - John The Ripper 04:10
    • 60: WPA/WPA2 Cracking - CoWPAtty 02:52
    • 61: WPA/WPA2 Cracking - Wifite 2 02:21
    • 62: WPA/WPA2 Cracking with GPUs : Hashcat - 1 05:26
    • 63: WPA/WPA2 Cracking with GPUs : Hashcat - 2 03:52
    • 64: WPA/WPA2 Cracking - Key Reinstallation Attack (KRACK) 07:13
    • 65: quiz 01:00
    • 66: WPS Cracking - Wifite 2: PIN Attack 03:50
    • 67: What we learned 01:56

Course media

Description

Hi there,
Welcome to Wi-Fi Hacking and Wireless Penetration Testing Course
WEP, WPA/WPA2, WPS Cracking, Wifi Recon & Password cracking.Learn how to hack Wi-Fi from real-world penetration tester!

Ethical hacking is a whole new technology in itself. The techniques of hacking are rapidly growing in numbers with hackers every day coming up with new ideas to steal our personal data. One such widely preferred ways of hacking is Wi-Fi hacking.

Wi-Fi hacking is easier than hacking a device connected to that WiFi. There are many free tools that can hack the less secure WiFi router. Apart from this, there are also advanced tools that work on backtrack and can even hack Wi-Fi router with high security.

In this course, you will learn how to crack the key and get the password to WiFi networks whether they use WEP, WPA, or even WPA2. While you are learning ethically hack you will also learn how to secure networks from hackers.

This course is for all levels. We will take you from beginner to advance level. You will learn step-by-step with hands-on demonstrations.
Whether you want to get your first job in IT security, become a white hat hacker, or prepare to check the security of your own home network, Oak Academy offers practical and accessible ethical hacking courses to help keep your networks safe from cybercriminals.

Penetration testing skills make you a more marketable IT tech. Understanding how to exploit servers, networks, and applications means that you will also be able to better prevent malicious exploitation. From website and network hacking, to pen testing in Python and Metasploit, Reed has a course for you.

At the end of the course you will learn;

  • Wireless Operating Modes: Ad-hoc, Infrastructure, Monitor modes.

  • Wireless Packet Types

  • MAC Frame Structure

  • Analysing Packet Types with Wireshark

  • Wi-Fi Network Interaction, Authentication MethodsWEP vs WPA/WPA2

  • WPA2 4-Way Handshake

  • WPA Personal and Enterprise

  • Wireless Reconnaissance with Bettercap

  • Wardriving with Kismet, Mapping with Google Earth

  • Rogue Access Points with Airbase-ng, Wifi Pumpkin 3, Fluxion

  • Handshake Snooper and Captive Portal Attack with Fluxion

  • Evil Twin Attack

  • WEP Cracking with Client and Clientless Networks

  • Fake Authentication Attack

  • Deauthentication Attack with Bettercap

  • ARP Request Replay Attack

  • Fragmentation Attack

  • ChopChop Attack

  • Cracking WPA/WPA2 with Aircrack-ng, John The Ripper, Cowpatty, Wifite 2

  • Passwordlists

  • WPA/WPA2 Cracking using GPUs with Hashcat

  • Key Reinstallation Attacks (KRACK)

  • WPS PIN Attacks and more...

  • Network Security

  • ethical

  • Ethical Intelligence

  • nmap nessus

  • nmap course

  • nmap metaspolit

  • Complete nmap

  • Kali linux nmap

  • ethical hacking

  • penetration testing

  • bug bounty

  • hack

  • cyber security

  • kali linux

  • android hacking

  • network security

  • hacking

  • security

  • security testing

  • nmap

  • metasploit

  • metasploit framework

  • penetration testing

  • oscp

  • security testing

  • windows hacking

  • exploit

  • bug bounty

  • bug bounty hunting

  • website hacking

  • web hacking

  • pentest+

  • pentest plus

  • OSINT (Open Source Intelligent )

  • social engineering

  • phishing

  • social engineering tool kit

  • wifi hacking wireless hacking password cracking wireless cracking wifi Wi-Fi Hacking and Wireless Penetration wifi hacking and wireless penetration testing wi-fi hacking muharrem aydin hacking kismet wireless hack wifi password hacking wireless penetration wifi cracking wifi password wps wireless penetration test wpa2 wifi hack recon wifi crack wifi hacking course hashcat wi-fi hacking wifi wifi penetration hack wifi wireless penetration testing wi-fi password penetration testing course offensive resources learn wifi hacking wi-fi hacking and wireless cracking wifi crack wifi evil twin attack

No prior knowledge is needed!

It doesn't need any prior knowledge to learn Ethical Hacking

This course starts with very basics. First, you will learn how to install the tools, some terminology. Then the show will start and you will learn everything with hands-on practices. I'll also teach you the best practices and shortcuts.

Step-by-Step Way, Simple and Easy With Exercises

By the end of the course, you’ll have a firm understanding of the Wifi Hacking and valuable insights on how things work under the hood and you'll also be very confident in cracking the key and get the password to WiFi networks, and hungry to learn more. The good news is since the Free and popular tools are used you don’t need to buy any tool or application.

You'll also get:

Lifetime Access to The Course

Fast & Friendly Support in the Q&A section

Dive in now to my Wi-Fi Hacking and Penetration Testing.

Who is this course for?

  • Anyone who want to do a Penetration Testing against Wi-Fi networks.
  • Anyone who are the System administrators and want to audit their Wi-Fi network configuration.
  • Anyone who want to protect themselves against these attacks.
  • People who are wifi hacking experts
  • People who want job transition into wireless hacking
  • People who want to take their password cracking skills to the next level

Requirements

  • Wi-Fi Adapter
  • 4 GB (Gigabytes) of RAM or higher (8 GB recommended) for wifi hacking
  • 64-bit system processor is mandatory for wireless hacking
  • 10 GB or more disk space for password cracking
  • Enable virtualization technology on BIOS settings, such as “Intel-VTx” for wireless
  • All items referenced in this course are Free for cracking
  • A strong desire to understand hacker tools and techniques in wifi
  • A strong work ethic, willingness to learn and plenty of excitement about the back door of the digital world
  • Nothing else! It’s just you, your computer and your ambition to get started today for wi-fi hacking

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

Provider

Oak Academy

At OAK Academy, we are the tech experts who have been in the sector for years and years. We are deeply rooted in the tech world. As insiders we know the tech industry’s biggest problem is the “tech skills gap” and here is our solution.

OAK Academy will be the bridge between the tech industry and people who

-are planning a new career

-are thinking career transformation

-want career shift or reinvention,

-have the desire to learn new hobbies at their own pace

We help people of this generation gain the skill to fill these jobs and to enjoy a happier, and a more fulfilling career prospect. This is what motivates us every day.

We specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, amazon fba, web and mobile development technologies. Thanks to our practical alignment, we are able to constantly translate industry insights into the most in-demand and up-to-date courses.

OAK Academy will provide you the information and support you need to move through your new career journey, with confidence and ease.

Our courses are for everyone. Whether you are someone who has never programmed before, or an existing programmer seeking to learn another language, or even someone looking to switch careers we are here.

OAK Academy here to transforms passionate, enthusiastic people to reach their dream job positions.

If you need help or if you have any questions, please do not hesitate to contact our team.

View Oak Academy profile

FAQs

Interest free credit agreements provided by Zopa Bank Limited trading as DivideBuy are not regulated by the Financial Conduct Authority and do not fall under the jurisdiction of the Financial Ombudsman Service. Zopa Bank Limited trading as DivideBuy is authorised by the Prudential Regulation Authority and regulated by the Financial Conduct Authority and the Prudential Regulation Authority, and entered on the Financial Services Register (800542). Zopa Bank Limited (10627575) is incorporated in England & Wales and has its registered office at: 1st Floor, Cottons Centre, Tooley Street, London, SE1 2QG. VAT Number 281765280. DivideBuy's trading address is First Floor, Brunswick Court, Brunswick Street, Newcastle-under-Lyme, ST5 1HH. © Zopa Bank Limited 2025. All rights reserved.