The Complete Raspberry Pi 2 Training Bundle

1 Review
3347 Enrolled
21 Hours
$19.00$214.00
You save 91% -

24 Lessons (3h)

  • Introduction
    Course Introduction
    Hardware Requirements
    Downloading and installing Kali Linux on Raspberry Pi
    Downloading and installing Kali Linux in VirtualBox on Windows
    Downloading and installing Kali Linux in VirtualBox on Mac OS X
    What's new in Kali Linux version 2 / 201623:02
    Connecting to Kali Linux for the first time - VirtualBox
    Connecting to Kali Linux for the first time - Raspberry Pi
    Updating Kali Linux
    Setting up your wireless adapter
    Conclusions
  • Bypassing Wireless LAN Authentication
    Bypassing Hidden SSIDs
    Bypassing MAC Address filtering
    Bypassing Shared Key Authentication
    Bypassing Open System Authentication
    Cracking WEP
    Cracking WEP with fern-wifi-cracker
    Cracking WPA & WPA2
    Cracking WPA2 with Wifite and Cowpatty
    Connecting to a WPA/WPA2 wireless network
    MITM - Man in the middle attack
    MITM with Ettercap
    Conclusions

Start Learning, Coding & Creating Projects with This Tiny Computer After 21 Hours of Education

CG
Cristian Gradosteanu

As a software developer, Cristian Gradisteanu is responsible for the development of management software products produced by his company. His areas of expertise include programming languages like Java, Objective-C, C#, C++, PHP, Ruby and system administration. He is very passionate about teaching everyday people topics that they are interested in, and feels that in order to keep up with the latest technology trends, your leaning process should be a continuous one. For more details on this course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

Description

Penetration Testing is a security practice in which you intentionally hack your own network to expose vulnerabilities. This course will teach you how to use a Raspberry Pi device to perform penetration tests and protect against common operating system vulnerabilities. You'll get a better grasp of your own network security, and know some of the methods most commonly used by hackers.

  • Access 24 lectures & 3 hours of content
  • Understand the functionality & security of computer networks
  • Learn how to use common Linux tools to penetrate wireless networks
  • Discover a valuable use for your Raspberry Pi
  • Discover methods hackers use to break into your network & how to combat them

Specs

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate
  • 3 Raspberry Pi minicomputers
  • A network switch
  • 1 Ethernet cable per Raspberry Pi

Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.