Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
Updated in May 2025. This course now features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. In this course, you will learn how to set up your Kali Linux lab environment properly, understand device communication, and master Man in the Middle (MITM) attacks. The course is divided into six sections: - Covering preparation (downloading and setting up Kali Linux), - Network basics - Gathering AP information before cracking (enumerating target access points and disconnecting or jamming wireless access points), - Cracking WEP/WPA/WPA2 encryption (learning the theory and practical steps behind each attack), - Performing MITM attacks (carrying out various post-modules such as playing music on the target OS, stealing credentials, and gaining full access to connected devices), - Protecting yourself against these attacks. By the end of the course, you will be able to perform MITM attacks on target networks, fully control connected computers, and protect yourself from MITM attacks. You will also learn to deal with many Kali Linux tools, carry out several attacks without having the key, gain access to any client account in the Wi-Fi network, and understand the basics of network security. This course is designed for both beginners, who will start from scratch and progress to a professional level, and professionals, who will enhance and refresh their knowledge about wireless network hacking. It is ideal for individuals interested in penetration testing against specific Wi-Fi networks.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

The OpenAI Breach Wasn't About OpenAI – It Was About the 84 Packages Above Them
The OpenAI breach highlights the importance of securing dependencies in the software supply chain, affecting 84 packages above them
Dev.to · Dimitris Kyrkos
Years of Apple's Best Security Work, Cracked in Five Days — Here's What Developers Should Know
Apple's best security measures were cracked in five days, highlighting the importance of ongoing security efforts for developers
Dev.to · ArshTechPro
TorCT PHP RAT 2026
Learn about TorCT PHP RAT, a stealthy Remote Access Trojan written in PHP that operates without port forwarding, and understand its implications for cybersecurity.
Dev.to AI
Building a Post-Quantum E2EE Library: Introducing Paranoia.ts (searching contributors)
Learn about building a post-quantum end-to-end encryption library with Paranoia.ts and its implications on web security
Dev.to · Matéo Callec
Up next
Cryptography
Coursera
Watch →