You don't currently have access to this contentYou don't currently have access to this contentYou don't currently have access to this contentYou don't currently have access to this contentYou don't currently have access to this contentYou don't currently have access to this contentYou don't currently have access to this contentYou don't currently have access to this contentYou don't currently have access to this contentYou don't currently have access to this contentYou don't currently have access to this content

Premium Course

Wireless Pentesting With The Raspberry Pi

Learn about Raspberry Pi and various network scenarios such as wireless security and network scanning

Subscribe for Full Access

Get this course and all premium content for as low as $33/month.

Subscribe now

Course Overview

Raspberry pi, a credit card-sized computer chip can help you design open and well-documented projects which are easy to build and modify. Ever thought, your portable raspberry pi tools can be converted into a low-cost hacking tool. 

EC-Council’s Mobile Security Toolkit (Better known as the STORM!) is a fully-loaded pen-test platform that comes equipped with STORM Linux (a Raspbian-based, customized distro of Linux equipped with the industry’s most popular hacking tools) loaded onto a portable touchscreen device.

This course will begin with setting up Kali Linux on Raspberry Pi 3. Further, you’ll learn about various network scenarios such as wireless security and network scanning, thus helping you to detect real-time issues and capture sensitive data. By the end of this course, you’ll be able to turn your Pi 3 into a honeypot and will be able to detect that hackers are on your wire.

What You Will Learn

Inside the Course

11 Lessons | 11 Topics | 11 Quizzes

Course Content

Expand All

Start Learning for as Little As $8 a Month!

Start Your FREE Two Week Trial

We are working day and night to bring you fresh courses every month. And we have brand new features in the works like guided career paths, hands-on labs and experiences, dedicated mentors, cyber range integration and so much more.

Related Courses

#
Featured Image for Business Continuity And Disaster Recovery Course.

Business Continuity And Disaster Recovery

#
Featured Image for Certified Information Systems Security Professional – CISSP Course.

Certified Information Systems Security Professional – CISSP

« » page 1 / 20