In this course, you will start as a beginner without any previous knowledge about hacking. This course focuses on both the practical side and the theoretical side. In this course, you will learn how to set up your Kali Linux lab Environment properly. In addition to that, you will learn how devices communicate with each other. Lastly, you’ll learn the best out of this course which is Man in the Middle Attacks. This course is divided into four sections: Preparation: In this section, you will learn how to download and set up the latest version of Kali Linux as a virtual machine or as your main OS. This helps you create your own safe hacking lab Environment. Network Basics: Here you will learn the basics of networks that will help you understand what should be done before network security testing. MITM Attack: In this section, you learn how to perform man-in-the-middle attacks and what post-modules can be carried out on the target OS. Modules like (playing music on the target OS, stealing credentials, and many more….). You’ll even learn how to gain full access to the connected devices. Protecting yourself against these attacks: After learning MITM attacks, it’s time to learn how to protect your OS against all previous attacks. Notes: These Attacks work on any device such as (Tablets Laptops and Smartphones etc….) and any operating system, such as (IOS, Android, Windows, Linux, OSX, etc….). You must practice what you learned to become an advanced level. This course is going to be always up to date. This course is only for educational purposes. If you have any questions, post your question in the Q&A section of this course or send me a direct message. I’ll be more than happy to assist you. After finishing this course, you will get a certificate from Udemy. All the people who enrolled in this course will get discounts for future courses. All the Rights are Reserved to Saad Sarraj no other Organization is involved.