{"id":39638,"date":"2021-07-08T13:52:27","date_gmt":"2021-07-08T10:52:27","guid":{"rendered":"https:\/\/researcherstore.com\/?post_type=courses&p=39638"},"modified":"2021-07-08T14:51:35","modified_gmt":"2021-07-08T11:51:35","slug":"wireless-hacking-series","status":"publish","type":"courses","link":"https:\/\/researcherstore.com\/courses\/wireless-hacking-series\/","title":{"rendered":"Wireless Hacking Series"},"content":{"rendered":"
This course is for beginners and IT pros looking to learn more about wireless hacking.\u00a0<\/strong><\/p>\n What are the pre-requisites for this course?<\/strong><\/p>\n What will you be able to do after taking this course?<\/strong><\/p>\n Cyberhacker Series: \u00a0Wireless Hacking\u00a0 This course is for beginners and IT pros looking to learn more about wireless hacking.\u00a0 What are the pre-requisites for this course? Students should have a working understanding of TCP\/IP and networking concepts. What will you be able to do after taking this course? Wireless Hacking with Kismet –\u00a0Kismet is a […]<\/p>\n","protected":false},"author":38,"featured_media":39647,"template":"","course-category":[285,207],"course-tag":[],"qubely_featured_image_url":{"full":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/0_zgtsdkzkj4zhvxjg_-\u062a\u062e\u0635\u064a\u0635.jpg",800,400,false],"landscape":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/0_zgtsdkzkj4zhvxjg_-\u062a\u062e\u0635\u064a\u0635.jpg",800,400,false],"portraits":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/0_zgtsdkzkj4zhvxjg_-\u062a\u062e\u0635\u064a\u0635.jpg",540,270,false],"thumbnail":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/0_zgtsdkzkj4zhvxjg_-\u062a\u062e\u0635\u064a\u0635.jpg",150,75,false],"medium":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/0_zgtsdkzkj4zhvxjg_-\u062a\u062e\u0635\u064a\u0635.jpg",300,150,false],"medium_large":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/0_zgtsdkzkj4zhvxjg_-\u062a\u062e\u0635\u064a\u0635.jpg",768,384,false],"large":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/0_zgtsdkzkj4zhvxjg_-\u062a\u062e\u0635\u064a\u0635.jpg",800,400,false],"1536x1536":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/0_zgtsdkzkj4zhvxjg_-\u062a\u062e\u0635\u064a\u0635.jpg",800,400,false],"2048x2048":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/0_zgtsdkzkj4zhvxjg_-\u062a\u062e\u0635\u064a\u0635.jpg",800,400,false],"qubely_landscape":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/0_zgtsdkzkj4zhvxjg_-\u062a\u062e\u0635\u064a\u0635.jpg",800,400,false],"qubely_portrait":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/0_zgtsdkzkj4zhvxjg_-\u062a\u062e\u0635\u064a\u0635.jpg",540,270,false],"qubely_thumbnail":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/0_zgtsdkzkj4zhvxjg_-\u062a\u062e\u0635\u064a\u0635.jpg",140,70,false],"woocommerce_thumbnail":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/0_zgtsdkzkj4zhvxjg_-\u062a\u062e\u0635\u064a\u0635-450x338.jpg",450,338,true],"woocommerce_single":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/0_zgtsdkzkj4zhvxjg_-\u062a\u062e\u0635\u064a\u0635-600x300.jpg",600,300,true],"woocommerce_gallery_thumbnail":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/0_zgtsdkzkj4zhvxjg_-\u062a\u062e\u0635\u064a\u0635-100x100.jpg",100,100,true]},"qubely_author":{"display_name":"ResearcherStore","author_link":"https:\/\/researcherstore.com\/user\/abuqamar\/"},"qubely_comment":0,"qubely_category":" G-Communication Engineering<\/a>I-Security Engineering<\/a>","qubely_excerpt":"Cyberhacker Series: \u00a0Wireless Hacking\u00a0 This course is for beginners and IT pros looking to learn more about wireless hacking.\u00a0 What are the pre-requisites for this course? Students should have a working understanding of TCP\/IP and networking concepts. What will you be able to do after taking this course? Wireless Hacking with Kismet –\u00a0Kismet is a…","_links":{"self":[{"href":"https:\/\/researcherstore.com\/wp-json\/wp\/v2\/courses\/39638"}],"collection":[{"href":"https:\/\/researcherstore.com\/wp-json\/wp\/v2\/courses"}],"about":[{"href":"https:\/\/researcherstore.com\/wp-json\/wp\/v2\/types\/courses"}],"author":[{"embeddable":true,"href":"https:\/\/researcherstore.com\/wp-json\/wp\/v2\/users\/38"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/researcherstore.com\/wp-json\/wp\/v2\/media\/39647"}],"wp:attachment":[{"href":"https:\/\/researcherstore.com\/wp-json\/wp\/v2\/media?parent=39638"}],"wp:term":[{"taxonomy":"course-category","embeddable":true,"href":"https:\/\/researcherstore.com\/wp-json\/wp\/v2\/course-category?post=39638"},{"taxonomy":"course-tag","embeddable":true,"href":"https:\/\/researcherstore.com\/wp-json\/wp\/v2\/course-tag?post=39638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}\n
\n
\n
ho, this course<\/a> is for:<\/h2>\n
\n