Kali Linux includes a plethora of tools. This course will focus on the various methods and tools that Kali includes to ethically hack your passwords and wireless networks.
Weak passwords and weak wireless networks can be catastrophic to an organization. In this course, Password and Wireless Attacks with Kali Linux, you’ll learn the techniques and tools included in Kali Linux that hackers might try to use against you. First, you’ll explore how easy it is to create a password profile. Next, you’ll discover the dangers of offline attacks. Finally, you’ll learn how to test your WiFi network for any weaknesses. When you’re finished with this course, you’ll have the skills and knowledge needed to protect your organization's passwords and wireless infrastructure.
Weak passwords and weak wireless networks can be catastrophic to an organization. In this course, Password and Wireless Attacks with Kali Linux, you’ll learn the techniques and tools included in Kali Linux that hackers might try to use against you. First, you’ll explore how easy it is to create a password profile. Next, you’ll discover the dangers of offline attacks. Finally, you’ll learn how to test your WiFi network for any weaknesses. When you’re finished with this course, you’ll have the skills and knowledge needed to protect your organization's passwords and wireless infrastructure.