Wireless Pentesting
with the Raspberry Pi
Pen-test your wireless network with
Raspberry Pi to avoid vulnerability attacks
START YOUR 14-DAY FREE TRIAL
Wireless Pentesting with the Raspberry Pi
Attack on Wireless Networks by hackers is the most common threat to the businesses in modern world. This course will teach you how to protect your network by converting your raspberry pi into a low-cost hacking tool.

This Course Will Help You To
![]() |
Learn network scanning, capturing data and cracking WPA/WPA2 with Kali Linux. |
![]() |
Learn to test your network wireless security system. |
![]() |
Build an extremely affordable tool to perform hacking. |
Who is it for?
Ethical hackers, cyber security enthusiasts and professionals interested in using Raspberry pi for penetration testing.
Security experts or novice Linux users who want to learn about Network and System Security.
Approach
Learn to secure wireless networks using hacking methods via Raspberry Pi.
About the Course
Wireless Pentesting with the Raspberry Pi
Raspberry pi, a credit card sized computer chip can help you design open and well documented projects which are easy to build and modify. Ever thought, a portable raspberry pi tool can be converted into a low-cost hacking tool.EC-Council’s Mobile Security Toolkit (Better known as the STORM!) is a fully-loaded pen-test platform which comes equipped with STORM Linux (a Raspbian based, customized distro of Linux equipped with the industry’s most popular hacking tools) loaded onto a portable touchscreen device.
This course will provide a practical experimentation of penetration hacking beginning with setting up Kali Linux on Raspberry Pi 3. Further, you’ll learn about various network scenarios such as wireless security and network scanning, thus helping you to detect real-time issues and capture sensitive data. By the end of this course, you’ll be able to turn your Pi 3 into a honeypot and will be able to detect that hackers are on your wire.
Getting up to Grips with the Hacking Concepts
Watch Your First Video
Course Outline
Section 1: Getting up to Grips with the Hacking Concepts
Section 2: Overview of Hacking Methodologies
Section 3: Getting Started with Wireless Hacking
Section 4: Lab 01 Wi-Fi Hacking
Section 5: Lab 02 Wi-Fi Hacking
Section 6: Intrusion Analysis- Logging Monitoring, and Detection
Section 7: Lab 03 RF Hacking
Section 8: Lab 01- Live Memory Analysis
Section 9: Lab 02- Basic Malware Analysis
Section 10: Lab 03- Forensic Triage
Section 11: Lab 04- Forensic Triage
Kevin Cardwell
Know Your Author
Kevin has worked extensively with banks and financial institutions throughout the Middle East, Europe and the UK. Served as leader of a DoD Red Team with 100% success rate of compromise. Some recent consulting projects include the Petroleum Development Oman and the Central Bank of Oman. He Designed and implemented the custom security baseline for the existing Oman Airport Management Company (OAMC) airports and the two new airports.
Wayne Burke
Know Your Author
Customers Who Loved Our Courses
Wireless Pentesting with the Raspberry Pi
willis.jake.a
I liked the way the course was a good mix of theory and hands on practice.
chwilson2012
Good understanding of the basic of forensics.
penguinsoho
Introduction of raspberry pi tools for penetration testing, with instruction on Ec-Councils Mobile Security Toolkit or STORM.
Gardinerachris
An excellent treatment of a crucial InfoSec domain area which is becoming more and more critical but is often neglected.