WiFi Hacking using Evil Twin Attacks and Captive Portals

Course Feature
  • Cost
    Paid
  • Provider
    Udemy
  • Certificate
    Paid Certification
  • Language
    English
  • Start Date
    2023-01-13
  • Learners
    No Information
  • Duration
    No Information
  • Instructor
    Juravlea Nicolae
Next Course
4.9
94,632 Ratings
This course will teach you how to create the most effective evil twin attacks using captive portals. You will learn how to use a variety of tools to perform evil twin attacks on targets and create a captive portal that steals login credentials. The attacks are highly practical and straight to the point, so by the end of the course you will have the knowledge to create and customize your own evil twin attack for different scenarios. Click this course to learn how to hack WiFi using evil twin attacks and captive portals.
Show All
Course Overview

❗The content presented here is sourced directly from Udemy platform. For comprehensive course details, including enrollment information, simply click on the 'Go to class' link on our website.

Updated in [July 17th, 2023]

This course provides an overview of WiFi hacking using evil twin attacks and captive portals. Participants will learn how to create the most common and effective evil twin attacks using captive portals. They will gain an understanding of how to perform evil twin attacks on targets using a wide variety of tools, and create a captive portal that effectively steals the login credentials. The course will also cover how to customize evil twin attacks for different scenarios. By the end of the course, participants will have the knowledge to create and customize their own evil twin attack.

Course Syllabus

Introduction

Evil Twin Attacks

WiFi Hacking Tools

Security

Show All
Pros & Cons
  • Clear and concise lectures
  • Comprehensive content
  • Short duration
  • Lack of subtitles in other languages
Show All
Recommended Courses
security-alarm-systems-the-complete-course-from-a-z-15217
Security alarm systems - The complete course from A-Z
4.7
Udemy 438 learners
Learn More
This course is perfect for anyone looking to learn about modern security systems and how to install and use them. It covers everything from wiring and installing hardware to programming the system and setting up emergency notifications. You'll also learn how to wire a home for security devices, or how to install battery powered devices depending on the situation. With this course, you'll be able to confidently install and use a professional DSC security system.
black-hat-approach-to-hacking-15218
Black Hat Approach to Hacking
4.9
Udemy 9,715 learners
Learn More
This course, Black Hat Approach to Hacking, is designed to help IT professionals, entrepreneurs, and beginners alike gain the knowledge and skills needed to understand and protect against cyber crimes. Through comprehensive modules created by industry experts, you will learn the fundamentals of ethical hacking and countermeasures. With this course, you will gain the confidence to pursue the field on your own and get an Ethical Hacking certificate to make your mark in the real-world. Enroll now and become an expert in the field of ethical hacking.
ethical-hacking-and-pentesting-guide-15219
Ethical hacking and pentesting guide
4.3
Udemy 6,208 learners
Learn More
This course is perfect for beginner bug bounty hunters who want to learn ethical hacking and pentesting. Uncle Rat, an experienced pen-tester, will provide a solid methodology to build upon and help you take the next step. Learn the basics of networking, the web, and hacking, OSCP based enumeration techniques, API testing, mobile testing, web application testing and more. Download video files, slides and extra cheat sheets to help you write your own legend.
a-practical-introduction-to-cloud-security-15220
A Practical Introduction to Cloud Security
3.4
Udemy 3,500 learners
Learn More
This course is a great opportunity for anyone interested in cloud security. It provides a practical introduction to the topic, covering best security practices, recent cloud breaches, privacy configuration, and more. Students will learn how to detect vulnerabilities in the cloud, and how to use existing security standards and frameworks to secure their cloud environment. With this course, you will gain the knowledge and skills to protect your cloud environment and ensure its security.
Favorites (0)
Favorites
0 favorite option

You have no favorites

Name delet