
4. Automatizando Ataques ao WEP, WPA-WPA2, WPS (1).mp4 - 234 MB

4. Automatizando Ataques ao WEP, WPA-WPA2, WPS.mp4 - 234 MB

6. Ataque Phishing Wireless com Evil Twin (1).mp4 - 181 MB

6. Ataque Phishing Wireless com Evil Twin.mp4 - 181 MB

5. Automatizando Ataques Rogue AP e Fake AP (1).mp4 - 89.6 MB

5. Automatizando Ataques Rogue AP e Fake AP.mp4 - 89.6 MB

1.1 modulo-07.zip (1).zip - 20.1 MB

1.1 modulo-07.zip.zip - 20.1 MB

7. Fixação de Conteúdo (1).mp4 - 18.8 MB

7. Fixação de Conteúdo.mp4 - 18.8 MB

2. Objetivos do Módulo 7 (1).mp4 - 13.7 MB

2. Objetivos do Módulo 7.mp4 - 13.7 MB

6. Ataque Phishing Wireless com Evil Twin (1).vtt - 19.7 kB

6. Ataque Phishing Wireless com Evil Twin.vtt - 19.7 kB

4. Automatizando Ataques ao WEP, WPA-WPA2, WPS (1).vtt - 17.8 kB

4. Automatizando Ataques ao WEP, WPA-WPA2, WPS.vtt - 17.8 kB

5. Automatizando Ataques Rogue AP e Fake AP (1).vtt - 8.56 kB

5. Automatizando Ataques Rogue AP e Fake AP.vtt - 8.56 kB

7. Fixação de Conteúdo (1).vtt - 2.36 kB

7. Fixação de Conteúdo.vtt - 2.36 kB

2. Objetivos do Módulo 7 (1).vtt - 1.22 kB

2. Objetivos do Módulo 7.vtt - 1.22 kB

8. Referências (1).html - 1.08 kB

8. Referências.html - 1.08 kB

3. Aviso Legal Lei 12.7372012, Art. 154-A, CP (1).html - 752 B

3. Aviso Legal Lei 12.7372012, Art. 154-A, CP.html - 752 B

1. Recursos do Módulo 7 (1).html - 388 B

1. Recursos do Módulo 7.html - 388 B

11. Bypass WIPS com Shellscript (Parte 1) (1).mp4 - 208 MB

11. Bypass WIPS com Shellscript (Parte 1).mp4 - 208 MB

15. Captura de IVs e Quebra da Chave WEP (1).mp4 - 203 MB

15. Captura de IVs e Quebra da Chave WEP.mp4 - 203 MB

18. Captura de Handshake e Quebra da Chave WPAWPA2 (1).mp4 - 195 MB

18. Captura de Handshake e Quebra da Chave WPAWPA2.mp4 - 195 MB

6. Conhecendo a Estrutura do Airodump-ng (1).mp4 - 135 MB

6. Conhecendo a Estrutura do Airodump-ng.mp4 - 135 MB

23. WPS, Ataque Pó de Duende (1).mp4 - 132 MB

23. WPS, Ataque Pó de Duende.mp4 - 132 MB

21. WPS, Ataque de Força-bruta com ReaverWPS (1).mp4 - 119 MB

21. WPS, Ataque de Força-bruta com ReaverWPS.mp4 - 119 MB

24. Bypass em Redes WiFi FON (1).mp4 - 117 MB

24. Bypass em Redes WiFi FON.mp4 - 117 MB

1.1 modulo-06.zip (1).zip - 86.3 MB

1.1 modulo-06.zip.zip - 86.3 MB

9. Ataque DoS com Aireplay-ng (1).mp4 - 78.2 MB

9. Ataque DoS com Aireplay-ng.mp4 - 78.2 MB

10. Ataque DoS com MDK3 (1).mp4 - 75.4 MB

10. Ataque DoS com MDK3.mp4 - 75.4 MB

4. Configurando a AntenaAdaptador Wi-Fi USB na VM (1).mp4 - 73.9 MB

4. Configurando a AntenaAdaptador Wi-Fi USB na VM.mp4 - 73.9 MB

22. WPS, Ataque de Força-bruta com BullyWPS (1).mp4 - 68.8 MB

22. WPS, Ataque de Força-bruta com BullyWPS.mp4 - 68.8 MB

12. Bypass WIPS com Shellscript (Parte 2) (1).mp4 - 61.8 MB

12. Bypass WIPS com Shellscript (Parte 2).mp4 - 61.8 MB

30. Exercício 02 Resolução (1).mp4 - 59.5 MB

30. Exercício 02 Resolução.mp4 - 59.5 MB

5. Monitorando Redes (1).mp4 - 57.2 MB

5. Monitorando Redes.mp4 - 57.2 MB

19. WPS, Conceitos e Vulnerabilidade (1).mp4 - 54.2 MB

19. WPS, Conceitos e Vulnerabilidade.mp4 - 54.2 MB

7. Burlando Filtros de MAC (MAC Spoofing) (1).mp4 - 52.9 MB

7. Burlando Filtros de MAC (MAC Spoofing).mp4 - 52.9 MB

27. Exercício 01 Resolução (1).mp4 - 47.1 MB

27. Exercício 01 Resolução.mp4 - 47.1 MB

16. Descriptografando Pacotes WEP Capturados (1).mp4 - 45.5 MB

16. Descriptografando Pacotes WEP Capturados.mp4 - 45.5 MB

25. Exercício 01 Descubra a chave WPA2 do ESSID BeYellow (1).mp4 - 35.9 MB

25. Exercício 01 Descubra a chave WPA2 do ESSID BeYellow.mp4 - 35.9 MB

13. Vulnerabilidades do Protocolo WEP (1).mp4 - 34.5 MB

13. Vulnerabilidades do Protocolo WEP.mp4 - 34.5 MB

28. Exercício 02 Descubra a chave WPA2 do ESSID AZULLAR (1).mp4 - 28 MB

28. Exercício 02 Descubra a chave WPA2 do ESSID AZULLAR.mp4 - 28 MB

20. Preparando o Laboratório para Ataque ao WPS (1).mp4 - 27.3 MB

20. Preparando o Laboratório para Ataque ao WPS.mp4 - 27.3 MB

8. Conceitos de Ataques DoS (Recusa de Serviços) (1).mp4 - 25.9 MB

8. Conceitos de Ataques DoS (Recusa de Serviços).mp4 - 25.9 MB

31. Fixação de Conteúdo (1).mp4 - 21.8 MB

31. Fixação de Conteúdo.mp4 - 21.8 MB

17. Preparando o Laboratório para Ataque ao WPAWPA2 (1).mp4 - 21.3 MB

17. Preparando o Laboratório para Ataque ao WPAWPA2.mp4 - 21.3 MB

14. Preparando o Laboratório para Ataques ao WEP (1).mp4 - 17.1 MB

14. Preparando o Laboratório para Ataques ao WEP.mp4 - 17.1 MB

2. Objetivos do Módulo 6 (1).mp4 - 9.01 MB

2. Objetivos do Módulo 6.mp4 - 9.01 MB

11. Bypass WIPS com Shellscript (Parte 1) (1).vtt - 22.6 kB

11. Bypass WIPS com Shellscript (Parte 1).vtt - 22.6 kB

18. Captura de Handshake e Quebra da Chave WPAWPA2 (1).vtt - 22.4 kB

18. Captura de Handshake e Quebra da Chave WPAWPA2.vtt - 22.4 kB

15. Captura de IVs e Quebra da Chave WEP (1).vtt - 21.5 kB

15. Captura de IVs e Quebra da Chave WEP.vtt - 21.5 kB

6. Conhecendo a Estrutura do Airodump-ng (1).vtt - 17.8 kB

6. Conhecendo a Estrutura do Airodump-ng.vtt - 17.8 kB

21. WPS, Ataque de Força-bruta com ReaverWPS (1).vtt - 12.8 kB

21. WPS, Ataque de Força-bruta com ReaverWPS.vtt - 12.8 kB

23. WPS, Ataque Pó de Duende (1).vtt - 12.7 kB

23. WPS, Ataque Pó de Duende.vtt - 12.7 kB

9. Ataque DoS com Aireplay-ng (1).vtt - 11.5 kB

9. Ataque DoS com Aireplay-ng.vtt - 11.5 kB

4. Configurando a AntenaAdaptador Wi-Fi USB na VM (1).vtt - 11.4 kB

4. Configurando a AntenaAdaptador Wi-Fi USB na VM.vtt - 11.4 kB

24. Bypass em Redes WiFi FON (1).vtt - 10.1 kB

24. Bypass em Redes WiFi FON.vtt - 10.1 kB

5. Monitorando Redes (1).vtt - 9.61 kB

5. Monitorando Redes.vtt - 9.61 kB

10. Ataque DoS com MDK3 (1).vtt - 8.9 kB

10. Ataque DoS com MDK3.vtt - 8.9 kB

7. Burlando Filtros de MAC (MAC Spoofing) (1).vtt - 7.14 kB

7. Burlando Filtros de MAC (MAC Spoofing).vtt - 7.14 kB

12. Bypass WIPS com Shellscript (Parte 2) (1).vtt - 6.64 kB

12. Bypass WIPS com Shellscript (Parte 2).vtt - 6.64 kB

22. WPS, Ataque de Força-bruta com BullyWPS (1).vtt - 6.2 kB

22. WPS, Ataque de Força-bruta com BullyWPS.vtt - 6.2 kB

19. WPS, Conceitos e Vulnerabilidade (1).vtt - 5.56 kB

19. WPS, Conceitos e Vulnerabilidade.vtt - 5.56 kB

30. Exercício 02 Resolução (1).vtt - 5.17 kB

30. Exercício 02 Resolução.vtt - 5.17 kB

27. Exercício 01 Resolução (1).vtt - 4.41 kB

27. Exercício 01 Resolução.vtt - 4.41 kB

16. Descriptografando Pacotes WEP Capturados (1).vtt - 3.93 kB

16. Descriptografando Pacotes WEP Capturados.vtt - 3.93 kB

25. Exercício 01 Descubra a chave WPA2 do ESSID BeYellow (1).vtt - 3.67 kB

25. Exercício 01 Descubra a chave WPA2 do ESSID BeYellow.vtt - 3.67 kB

28. Exercício 02 Descubra a chave WPA2 do ESSID AZULLAR (1).vtt - 2.89 kB

28. Exercício 02 Descubra a chave WPA2 do ESSID AZULLAR.vtt - 2.89 kB

20. Preparando o Laboratório para Ataque ao WPS (1).vtt - 2.76 kB

20. Preparando o Laboratório para Ataque ao WPS.vtt - 2.76 kB

31. Fixação de Conteúdo (1).vtt - 2.7 kB

31. Fixação de Conteúdo.vtt - 2.7 kB

8. Conceitos de Ataques DoS (Recusa de Serviços) (1).vtt - 2.42 kB

8. Conceitos de Ataques DoS (Recusa de Serviços).vtt - 2.42 kB

17. Preparando o Laboratório para Ataque ao WPAWPA2 (1).vtt - 1.93 kB

17. Preparando o Laboratório para Ataque ao WPAWPA2.vtt - 1.93 kB

32. Referências (1).html - 1.91 kB

32. Referências.html - 1.91 kB

14. Preparando o Laboratório para Ataques ao WEP (1).vtt - 1.76 kB

14. Preparando o Laboratório para Ataques ao WEP.vtt - 1.76 kB

3. Aviso Legal Lei 12.7372012, Art. 154-A, CP (1).html - 752 B

3. Aviso Legal Lei 12.7372012, Art. 154-A, CP.html - 752 B

1. Recursos do Módulo 6 (1).html - 388 B

1. Recursos do Módulo 6.html - 388 B

26. Identificando a chave WPA2 do ESSID BeYellow (1).html - 162 B

26. Identificando a chave WPA2 do ESSID BeYellow.html - 162 B

29. Identificando a chave WPA2 do ESSID AZULLAR (1).html - 162 B

29. Identificando a chave WPA2 do ESSID AZULLAR.html - 162 B

15. Wordlists Criando seu próprio programa (1).mp4 - 138 MB

15. Wordlists Criando seu próprio programa.mp4 - 138 MB

11. Wordlists Dicionário de Senhas com CRUNCH (1).mp4 - 100 MB

11. Wordlists Dicionário de Senhas com CRUNCH.mp4 - 100 MB

4. Contas e Senhas Características e conceitos (1).mp4 - 65.5 MB

4. Contas e Senhas Características e conceitos.mp4 - 65.5 MB

12. Wordlists Dicionário de Senhas com CUPP (1).mp4 - 59.6 MB

12. Wordlists Dicionário de Senhas com CUPP.mp4 - 59.6 MB

14. Wordlists Dicionário de Senhas com CeWL (1).mp4 - 45.8 MB

14. Wordlists Dicionário de Senhas com CeWL.mp4 - 45.8 MB

7. Testando a complexidade e vazamento de senhas (1).mp4 - 45.8 MB

7. Testando a complexidade e vazamento de senhas.mp4 - 45.8 MB

6. Entropia de Senhas Boas práticas (1).mp4 - 40.2 MB

6. Entropia de Senhas Boas práticas.mp4 - 40.2 MB

8. Criando senhas complexas e fáceis de lembrar (1).mp4 - 36.9 MB

8. Criando senhas complexas e fáceis de lembrar.mp4 - 36.9 MB

1.1 modulo-05.zip (1).zip - 33.4 MB

1.1 modulo-05.zip.zip - 33.4 MB

5. Principais ataques em Senhas (1).mp4 - 31 MB

5. Principais ataques em Senhas.mp4 - 31 MB

9. Cracking Passwords Ferramentas Gerais para Quebra de Senhas (1).mp4 - 23.6 MB

9. Cracking Passwords Ferramentas Gerais para Quebra de Senhas.mp4 - 23.6 MB

13. Wordlists Dicionário de Senhas com CUPP (Atualização cupp.cfg) (1).mp4 - 18.1 MB

13. Wordlists Dicionário de Senhas com CUPP (Atualização cupp.cfg).mp4 - 18.1 MB

10. Cracking Wi-Fi Tools Ferramentas utilizadas (1).mp4 - 16.5 MB

10. Cracking Wi-Fi Tools Ferramentas utilizadas.mp4 - 16.5 MB

16. Fixação de Conteúdo (1).mp4 - 11.2 MB

16. Fixação de Conteúdo.mp4 - 11.2 MB

2. Objetivos do Módulo 5 (1).mp4 - 10.2 MB

2. Objetivos do Módulo 5.mp4 - 10.2 MB

15. Wordlists Criando seu próprio programa (1).vtt - 24.8 kB

15. Wordlists Criando seu próprio programa.vtt - 24.8 kB

11. Wordlists Dicionário de Senhas com CRUNCH (1).vtt - 14.8 kB

11. Wordlists Dicionário de Senhas com CRUNCH.vtt - 14.8 kB

12. Wordlists Dicionário de Senhas com CUPP (1).vtt - 10.1 kB

12. Wordlists Dicionário de Senhas com CUPP.vtt - 10.1 kB

4. Contas e Senhas Características e conceitos (1).vtt - 8.91 kB

4. Contas e Senhas Características e conceitos.vtt - 8.91 kB

6. Entropia de Senhas Boas práticas (1).vtt - 7.36 kB

6. Entropia de Senhas Boas práticas.vtt - 7.36 kB

14. Wordlists Dicionário de Senhas com CeWL (1).vtt - 7.08 kB

14. Wordlists Dicionário de Senhas com CeWL.vtt - 7.08 kB

7. Testando a complexidade e vazamento de senhas (1).vtt - 5.85 kB

7. Testando a complexidade e vazamento de senhas.vtt - 5.85 kB

8. Criando senhas complexas e fáceis de lembrar (1).vtt - 5.4 kB

8. Criando senhas complexas e fáceis de lembrar.vtt - 5.4 kB

5. Principais ataques em Senhas (1).vtt - 4.04 kB

5. Principais ataques em Senhas.vtt - 4.04 kB

13. Wordlists Dicionário de Senhas com CUPP (Atualização cupp.cfg) (1).vtt - 2.76 kB

13. Wordlists Dicionário de Senhas com CUPP (Atualização cupp.cfg).vtt - 2.76 kB

9. Cracking Passwords Ferramentas Gerais para Quebra de Senhas (1).vtt - 2.49 kB

9. Cracking Passwords Ferramentas Gerais para Quebra de Senhas.vtt - 2.49 kB

16. Fixação de Conteúdo (1).vtt - 1.65 kB

16. Fixação de Conteúdo.vtt - 1.65 kB

10. Cracking Wi-Fi Tools Ferramentas utilizadas (1).vtt - 1.47 kB

10. Cracking Wi-Fi Tools Ferramentas utilizadas.vtt - 1.47 kB

17. Referências (1).html - 1.28 kB

17. Referências.html - 1.28 kB

2. Objetivos do Módulo 5 (1).vtt - 1.22 kB

2. Objetivos do Módulo 5.vtt - 1.22 kB

3. Aviso Legal Lei 12.7372012, Art. 154-A, CP (1).html - 752 B

3. Aviso Legal Lei 12.7372012, Art. 154-A, CP.html - 752 B

1. Recursos do Módulo 5 (1).html - 388 B

1. Recursos do Módulo 5.html - 388 B

7.1 How Secure Is My Password (1).html - 95 B

7.1 How Secure Is My Password.html - 95 B

7.1 Password Checker (Kaspersky Lab) (1).html - 95 B

7.1 Password Checker (Kaspersky Lab).html - 95 B

7.2 How Secure Is My Password (1).html - 95 B

7.2 How Secure Is My Password.html - 95 B

7.2 Password Checker (Kaspersky Lab) (1).html - 95 B

7.2 Password Checker (Kaspersky Lab).html - 95 B

7.3 Have I Been Pwned (1).html - 88 B

7.3 Have I Been Pwned.html - 88 B

4. Manipulando Arquivos e Pastas (1).mp4 - 72.2 MB

4. Manipulando Arquivos e Pastas.mp4 - 72.2 MB

3. Navegando Entre Diretórios (1).mp4 - 38.8 MB

3. Navegando Entre Diretórios.mp4 - 38.8 MB

8. Filtrando Linhas com Grep (1).mp4 - 38.7 MB

8. Filtrando Linhas com Grep.mp4 - 38.7 MB

6. Copiando e Movendo Arquivos (1).mp4 - 37.1 MB

6. Copiando e Movendo Arquivos.mp4 - 37.1 MB

9. Leitura de Arquivos com More e Less (1).mp4 - 33.5 MB

9. Leitura de Arquivos com More e Less.mp4 - 33.5 MB

5. Dicas de Navegação no Terminal (1).mp4 - 29.2 MB

5. Dicas de Navegação no Terminal.mp4 - 29.2 MB

1. Conhecendo o Terminal do Linux (1).mp4 - 26.8 MB

1. Conhecendo o Terminal do Linux.mp4 - 26.8 MB

14. Lidando com Arquivos Ocultos (1).mp4 - 22 MB

14. Lidando com Arquivos Ocultos.mp4 - 22 MB

16. Instalar ou Remover Programas e Desligar o Sistema (1).mp4 - 17.9 MB

16. Instalar ou Remover Programas e Desligar o Sistema.mp4 - 17.9 MB

13. Comando Echo (1).mp4 - 16.5 MB

13. Comando Echo.mp4 - 16.5 MB

17. Verificando a Versão do Sistema Operacional (1).mp4 - 15.2 MB

17. Verificando a Versão do Sistema Operacional.mp4 - 15.2 MB

15. Alterando Senhas e Trocando de Usuário (1).mp4 - 14.9 MB

15. Alterando Senhas e Trocando de Usuário.mp4 - 14.9 MB

10. Testando a Conectividade com a Internet (1).mp4 - 14.8 MB

10. Testando a Conectividade com a Internet.mp4 - 14.8 MB

11. Contando Linhas de um Arquivo (1).mp4 - 14.3 MB

11. Contando Linhas de um Arquivo.mp4 - 14.3 MB

7. Comandos Head e Tail (1).mp4 - 11.9 MB

7. Comandos Head e Tail.mp4 - 11.9 MB

2. Obtendo Ajuda para Comandos (1).mp4 - 11.6 MB

2. Obtendo Ajuda para Comandos.mp4 - 11.6 MB

12. Concatenando Arquivos (1).mp4 - 10.7 MB

12. Concatenando Arquivos.mp4 - 10.7 MB

4. Manipulando Arquivos e Pastas (1).vtt - 12.6 kB

4. Manipulando Arquivos e Pastas.vtt - 12.6 kB

3. Navegando Entre Diretórios (1).vtt - 7 kB

3. Navegando Entre Diretórios.vtt - 7 kB

5. Dicas de Navegação no Terminal (1).vtt - 6.18 kB

5. Dicas de Navegação no Terminal.vtt - 6.18 kB

8. Filtrando Linhas com Grep (1).vtt - 5.85 kB

8. Filtrando Linhas com Grep.vtt - 5.85 kB

6. Copiando e Movendo Arquivos (1).vtt - 5.21 kB

6. Copiando e Movendo Arquivos.vtt - 5.21 kB

1. Conhecendo o Terminal do Linux (1).vtt - 4.74 kB

1. Conhecendo o Terminal do Linux.vtt - 4.74 kB

9. Leitura de Arquivos com More e Less (1).vtt - 3.98 kB

9. Leitura de Arquivos com More e Less.vtt - 3.98 kB

16. Instalar ou Remover Programas e Desligar o Sistema (1).vtt - 3.33 kB

16. Instalar ou Remover Programas e Desligar o Sistema.vtt - 3.33 kB

14. Lidando com Arquivos Ocultos (1).vtt - 2.96 kB

14. Lidando com Arquivos Ocultos.vtt - 2.96 kB

15. Alterando Senhas e Trocando de Usuário (1).vtt - 2.55 kB

15. Alterando Senhas e Trocando de Usuário.vtt - 2.55 kB

10. Testando a Conectividade com a Internet (1).vtt - 2.21 kB

10. Testando a Conectividade com a Internet.vtt - 2.21 kB

13. Comando Echo (1).vtt - 1.96 kB

13. Comando Echo.vtt - 1.96 kB

17. Verificando a Versão do Sistema Operacional (1).vtt - 1.91 kB

17. Verificando a Versão do Sistema Operacional.vtt - 1.91 kB

2. Obtendo Ajuda para Comandos (1).vtt - 1.76 kB

2. Obtendo Ajuda para Comandos.vtt - 1.76 kB

11. Contando Linhas de um Arquivo (1).vtt - 1.67 kB

11. Contando Linhas de um Arquivo.vtt - 1.67 kB

7. Comandos Head e Tail (1).vtt - 1.57 kB

7. Comandos Head e Tail.vtt - 1.57 kB

12. Concatenando Arquivos (1).vtt - 1.51 kB

12. Concatenando Arquivos.vtt - 1.51 kB

18. Avaliação de Comandos Linux (1).html - 162 B

18. Avaliação de Comandos Linux.html - 162 B

6. Compartilhando Pastas entre seu Computador e a VM (1).mp4 - 69 MB

6. Compartilhando Pastas entre seu Computador e a VM.mp4 - 69 MB

5. Procedimentos Pós-Instalação da VM (1).mp4 - 60.3 MB

5. Procedimentos Pós-Instalação da VM.mp4 - 60.3 MB

2. Por que criar seu S.O. personalizado (1).mp4 - 24.3 MB

2. Por que criar seu S.O. personalizado.mp4 - 24.3 MB

4. Configurando e Importando a VM com S.O. Debian (1).mp4 - 23.2 MB

4. Configurando e Importando a VM com S.O. Debian.mp4 - 23.2 MB

3. Preparando o Ambiente (1).mp4 - 16.3 MB

3. Preparando o Ambiente.mp4 - 16.3 MB

1.1 modulo-01.zip (1).zip - 11.1 MB

1.1 modulo-01.zip.zip - 11.1 MB

1.2 modulo-01.zip (1).zip - 11.1 MB

1.2 modulo-01.zip.zip - 11.1 MB

6. Compartilhando Pastas entre seu Computador e a VM (1).vtt - 9.95 kB

6. Compartilhando Pastas entre seu Computador e a VM.vtt - 9.95 kB

5. Procedimentos Pós-Instalação da VM (1).vtt - 7.76 kB

5. Procedimentos Pós-Instalação da VM.vtt - 7.76 kB

4. Configurando e Importando a VM com S.O. Debian (1).vtt - 4.03 kB

4. Configurando e Importando a VM com S.O. Debian.vtt - 4.03 kB

2. Por que criar seu S.O. personalizado (1).vtt - 3.41 kB

2. Por que criar seu S.O. personalizado.vtt - 3.41 kB

3. Preparando o Ambiente (1).vtt - 2.23 kB

3. Preparando o Ambiente.vtt - 2.23 kB

1. Recursos do Módulo 1 (1).html - 388 B

1. Recursos do Módulo 1.html - 388 B

5.1 Download da Máquina Virtual Pronta (1).html - 133 B

5.1 Download da Máquina Virtual Pronta.html - 133 B

1.1 Download da Máquina Virtual Pronta (1).html - 127 B

1.1 Download da Máquina Virtual Pronta.html - 127 B

1.2 Download da Máquina Virtual Pronta (1).html - 127 B

1.2 Download da Máquina Virtual Pronta.html - 127 B

1.3 Download da ISO do S.O. Debian Stretch (debian-xx.xx.xx-amd64-xfce-CD-1.iso) (1).html - 119 B

1.3 Download da ISO do S.O. Debian Stretch (debian-xx.xx.xx-amd64-xfce-CD-1.iso).html - 119 B

3.1 Configurando a VM e Instalando SO Debian (1).html - 89 B

3.1 Configurando a VM e Instalando SO Debian.html - 89 B

4.1 Configurando a VM e Instalando do S.O. Debian (1).html - 89 B

4.1 Configurando a VM e Instalando do S.O. Debian.html - 89 B

4. Wi-Fi Tipos de Antenas (1).mp4 - 53.7 MB

4. Wi-Fi Tipos de Antenas.mp4 - 53.7 MB

6. Wi-Fi Irradiação x Sinal x Ruído (1).mp4 - 37.2 MB

6. Wi-Fi Irradiação x Sinal x Ruído.mp4 - 37.2 MB

7. Wi-Fi Canais e a frequência de operação (1).mp4 - 34.7 MB

7. Wi-Fi Canais e a frequência de operação.mp4 - 34.7 MB

8. Dica Aplicativo para Android (1).mp4 - 25.9 MB

8. Dica Aplicativo para Android.mp4 - 25.9 MB

1.1 modulo-04.zip (1).zip - 25.4 MB

1.1 modulo-04.zip.zip - 25.4 MB

3. Wi-Fi Antenas x Frequência (1).mp4 - 20.6 MB

3. Wi-Fi Antenas x Frequência.mp4 - 20.6 MB

5. Wi-Fi dBi x Alcance (1).mp4 - 20 MB

5. Wi-Fi dBi x Alcance.mp4 - 20 MB

2. Objetivos do Módulo 4 (1).mp4 - 8.44 MB

2. Objetivos do Módulo 4.mp4 - 8.44 MB

9. Fixação de Conteúdo (1).mp4 - 7.78 MB

9. Fixação de Conteúdo.mp4 - 7.78 MB

4. Wi-Fi Tipos de Antenas (1).vtt - 7.09 kB

4. Wi-Fi Tipos de Antenas.vtt - 7.09 kB

6. Wi-Fi Irradiação x Sinal x Ruído (1).vtt - 4.96 kB

6. Wi-Fi Irradiação x Sinal x Ruído.vtt - 4.96 kB

7. Wi-Fi Canais e a frequência de operação (1).vtt - 4.17 kB

7. Wi-Fi Canais e a frequência de operação.vtt - 4.17 kB

8. Dica Aplicativo para Android (1).vtt - 2.99 kB

8. Dica Aplicativo para Android.vtt - 2.99 kB

3. Wi-Fi Antenas x Frequência (1).vtt - 2.65 kB

3. Wi-Fi Antenas x Frequência.vtt - 2.65 kB

5. Wi-Fi dBi x Alcance (1).vtt - 2.13 kB

5. Wi-Fi dBi x Alcance.vtt - 2.13 kB

10. Referências (1).html - 982 B

10. Referências.html - 982 B

2. Objetivos do Módulo 4 (1).vtt - 888 B

2. Objetivos do Módulo 4.vtt - 888 B

1. Recursos do Módulo 4 (1).html - 388 B

1. Recursos do Módulo 4.html - 388 B

8.1 Aplicativo Wi-Fi Analyzer (Google Play Store) (1).html - 141 B

8.1 Aplicativo Wi-Fi Analyzer (Google Play Store).html - 141 B

4. Materiais Importantes (1).mp4 - 49.3 MB

4. Materiais Importantes.mp4 - 49.3 MB

3. Ementa e Conteúdo Programático (1).mp4 - 36.1 MB

3. Ementa e Conteúdo Programático.mp4 - 36.1 MB

6. Avaliações e Certificados (Udemy e União Geek) (1).mp4 - 31.1 MB

6. Avaliações e Certificados (Udemy e União Geek).mp4 - 31.1 MB

7. Um pouco sobre o Instrutor (1).mp4 - 27.4 MB

7. Um pouco sobre o Instrutor.mp4 - 27.4 MB

1. Introdução (1).mp4 - 21.2 MB

1. Introdução.mp4 - 21.2 MB

5. Bibliografia Recomendada e Estrutura do Curso (1).mp4 - 21.1 MB

5. Bibliografia Recomendada e Estrutura do Curso.mp4 - 21.1 MB

1.1 #M0 Apresentação do Curso.pdf (1).pdf - 20 MB

1.1 #M0 Apresentação do Curso.pdf.pdf - 20 MB

2. Público Alvo e Objetivos (1).mp4 - 12.2 MB

2. Público Alvo e Objetivos.mp4 - 12.2 MB

4. Materiais Importantes (1).vtt - 7.9 kB

4. Materiais Importantes.vtt - 7.9 kB

3. Ementa e Conteúdo Programático (1).vtt - 7.83 kB

3. Ementa e Conteúdo Programático.vtt - 7.83 kB

6. Avaliações e Certificados (Udemy e União Geek) (1).vtt - 5.13 kB

6. Avaliações e Certificados (Udemy e União Geek).vtt - 5.13 kB

7. Um pouco sobre o Instrutor (1).vtt - 3.54 kB

7. Um pouco sobre o Instrutor.vtt - 3.54 kB

1. Introdução (1).vtt - 3.52 kB

1. Introdução.vtt - 3.52 kB

5. Bibliografia Recomendada e Estrutura do Curso (1).vtt - 3.31 kB

5. Bibliografia Recomendada e Estrutura do Curso.vtt - 3.31 kB

2. Público Alvo e Objetivos (1).vtt - 1.79 kB

2. Público Alvo e Objetivos.vtt - 1.79 kB

7.1 LinkedIn (1).html - 99 B

7.1 LinkedIn.html - 99 B

7.2 LinkedIn (1).html - 99 B

7.2 LinkedIn.html - 99 B

7.3 Currículo Lattes (1).html - 99 B

7.3 Currículo Lattes.html - 99 B

7.1 Palestras do Instrutor (1).html - 96 B

7.1 Palestras do Instrutor.html - 96 B

7.2 Palestras do Instrutor (1).html - 96 B

7.2 Palestras do Instrutor.html - 96 B

6. IEEE 802.11, Características (1).mp4 - 42 MB

6. IEEE 802.11, Características.mp4 - 42 MB

1.1 modulo-03.zip (1).zip - 39.1 MB

1.1 modulo-03.zip.zip - 39.1 MB

5. IEEE 802.11, Modos de Operação (1).mp4 - 37.8 MB

5. IEEE 802.11, Modos de Operação.mp4 - 37.8 MB

17. Principais Ataques em Redes Wi-Fi (1).mp4 - 35.5 MB

17. Principais Ataques em Redes Wi-Fi.mp4 - 35.5 MB

16. Resumindo algumas configurações (1).mp4 - 25.7 MB

16. Resumindo algumas configurações.mp4 - 25.7 MB

4. IEEE 802.11, Funcionamento e Padrões (1).mp4 - 23.9 MB

4. IEEE 802.11, Funcionamento e Padrões.mp4 - 23.9 MB

8. IEEE 802.11, Beacons e Probes (1).mp4 - 20.4 MB

8. IEEE 802.11, Beacons e Probes.mp4 - 20.4 MB

15. Distribuição de Chaves de Autenticação (1).mp4 - 19.2 MB

15. Distribuição de Chaves de Autenticação.mp4 - 19.2 MB

9. Processos de Associação em Redes Sem-fios (1).mp4 - 16.8 MB

9. Processos de Associação em Redes Sem-fios.mp4 - 16.8 MB

14. Algoritmos de Encriptação (1).mp4 - 15 MB

14. Algoritmos de Encriptação.mp4 - 15 MB

11. Protocolo WEP (1).mp4 - 14.8 MB

11. Protocolo WEP.mp4 - 14.8 MB

10. Princípios de Segurança em WLAN (1).mp4 - 13.7 MB

10. Princípios de Segurança em WLAN.mp4 - 13.7 MB

3. Padronização do Wi-Fi (1).mp4 - 13.6 MB

3. Padronização do Wi-Fi.mp4 - 13.6 MB

13. Protocolo WPA2 (1).mp4 - 11.7 MB

13. Protocolo WPA2.mp4 - 11.7 MB

12. Protocolo WPA (1).mp4 - 10.6 MB

12. Protocolo WPA.mp4 - 10.6 MB

18. Fixação de Conteúdo (1).mp4 - 9.24 MB

18. Fixação de Conteúdo.mp4 - 9.24 MB

2. Objetivos do Módulo 3 (1).mp4 - 7.11 MB

2. Objetivos do Módulo 3.mp4 - 7.11 MB

6. IEEE 802.11, Características (1).vtt - 5.26 kB

6. IEEE 802.11, Características.vtt - 5.26 kB

17. Principais Ataques em Redes Wi-Fi (1).vtt - 5.18 kB

17. Principais Ataques em Redes Wi-Fi.vtt - 5.18 kB

5. IEEE 802.11, Modos de Operação (1).vtt - 4.55 kB

5. IEEE 802.11, Modos de Operação.vtt - 4.55 kB

4. IEEE 802.11, Funcionamento e Padrões (1).vtt - 3.18 kB

4. IEEE 802.11, Funcionamento e Padrões.vtt - 3.18 kB

16. Resumindo algumas configurações (1).vtt - 2.87 kB

16. Resumindo algumas configurações.vtt - 2.87 kB

8. IEEE 802.11, Beacons e Probes (1).vtt - 2.56 kB

8. IEEE 802.11, Beacons e Probes.vtt - 2.56 kB

15. Distribuição de Chaves de Autenticação (1).vtt - 2.28 kB

15. Distribuição de Chaves de Autenticação.vtt - 2.28 kB

9. Processos de Associação em Redes Sem-fios (1).vtt - 2.1 kB

9. Processos de Associação em Redes Sem-fios.vtt - 2.1 kB

14. Algoritmos de Encriptação (1).vtt - 1.59 kB

14. Algoritmos de Encriptação.vtt - 1.59 kB

11. Protocolo WEP (1).vtt - 1.52 kB

11. Protocolo WEP.vtt - 1.52 kB

3. Padronização do Wi-Fi (1).vtt - 1.31 kB

3. Padronização do Wi-Fi.vtt - 1.31 kB

19. Referências (1).html - 1.26 kB

19. Referências.html - 1.26 kB

13. Protocolo WPA2 (1).vtt - 1.22 kB

13. Protocolo WPA2.vtt - 1.22 kB

18. Fixação de Conteúdo (1).vtt - 1.13 kB

18. Fixação de Conteúdo.vtt - 1.13 kB

12. Protocolo WPA (1).vtt - 1.08 kB

12. Protocolo WPA.vtt - 1.08 kB

2. Objetivos do Módulo 3 (1).vtt - 667 B

2. Objetivos do Módulo 3.vtt - 667 B

7. Leitura Obrigatória (1).html - 440 B

7. Leitura Obrigatória.html - 440 B

1. Recursos do Módulo 3 (1).html - 388 B

1. Recursos do Módulo 3.html - 388 B