Welcome to the course! In this session, we’ll give you a detailed overview of the course structure and highlight the key concepts you’ll explore in each section.
Introduction and Course Outline
0/2
Introduction to Network Fundamentals
0/2
Preparation – Setting Up The Lab
0/4
Basic overview of Kali Linux
0/1
Linux Terminal Including Basic Functionalities and CLI
0/1
Understanding Network Basics
0/4
Pre Connection Attacks
0/3
Gaining Access
0/1
Gaining Access-WEP Cracking
0/5
Gaining Access WPAWPA2 Cracking
0/6
Gaining Access – Security and Mitigation
0/1
Post Connection Attacks
0/1
Post Connection Attacks – Information Gathering
0/2
Post Connection Attacks – Man In The Middle Attacks (MITM)
0/5
Post Connection Attacks – Gaining Full Contol Over Devices On The Same Network
0/7
ARP-Poisoning Deduction & Security
0/1
Navigating the Landscape of Global Cyber Attacks
0/2