# Additional Resources

*Dont, stop learning, Do the **CEH Practical course** and get certified as a **Certified Ethical Hacker (Practical)***

[**CEH Practical Complete Preparation Course**](https://www.udemy.com/course/training-for-ceh-practical/?referralCode=289CF01CF51246BCAD6C)

\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_

### Recommended Courses to get started in **practical pentesting and hacking**

{% embed url="<https://www.udemy.com/course/practical-hacking-pentesting-guide/?referralCode=CE0BCED85E7608ACC031>" %}

{% embed url="<https://www.udemy.com/course/crack-windows-passwords/?referralCode=82D81C6B54BA4DB70A15>" %}

{% embed url="<https://www.udemy.com/course/office-password-cracking/?referralCode=3AC1F35BD17DC4739BC0>" %}

{% embed url="<https://www.udemy.com/course/ethical-hacker-practical/?referralCode=289CF01CF51246BCAD6C>" %}

{% embed url="<https://www.udemy.com/course/iot-security-beginners/?referralCode=997AF261C2E6F99BC914>" %}

{% embed url="<https://www.udemy.com/course/practical-malware-analysis-for-beginners/?referralCode=CF1C47BF5371D1B9F20A>" %}

{% embed url="<https://www.udemy.com/course/practical-osint/?referralCode=0848C4EC66BBAC2534D6>" %}

{% embed url="<https://www.udemy.com/course/ai-red-teaming/?referralCode=E1EC6DD5FBC422498668>" %}

\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_

### **Best WIFI card for Wifi Hacking**

Hacking Wireless Networks require wireless cards that support the monitor mode and packet Injection. Here is a list of Best WiFi Adapters for Kali Linux that are 100% compatible with the latest Kali Linux, that can go into monitor mode, inject packets and perform everything that is needed for a full-fledged WiFi Penetration Testing. Alpha adapters are best for WIFI pen testing in their price range and are compatible with Kali Linux.

### **Why We Need a USB WiFi Adapter For Kali Linux?**

Every Laptop has a WIFI card in build. But why do we need an external WIFI adapter then? There are two issues with that, though.

· The first issue is that we cannot access built-in wireless adapters via Kali if installed as a virtual machine.

· The second and most serious issue is that these built-in wireless adapters are not suitable for hacking.

Even if we install Kali Linux as our primary machine, then we will get access to our built-in wireless card, but we will not be able to use it for hacking because it does not support monitor mode or packet injection. So if we need to use it for WiFi auditing and other interesting Kali Linux stuff like aircrack-ng and other tools, we will need to acquire a Kali Linux USB WiFi adapter.

Now while shopping for the best wireless adapter, you must be looking for the range of the wireless adapter and the frequency band it supports. Either it supports the 5 GHz band or not.

### **Best WIFI Adapters for WIFI hacking**

* [AWUS036ACH](https://amzn.to/3DKcKYE)- New USB C type - $60
* [Alfa AWUS036ACM ](https://amzn.to/41qS8wl)- Long Range dual band - $70
* [BrosTrend 650Mbps](https://amzn.to/4iwJGmp)- Economical Does the Job- $20
* [ALFA Network AWUS036ACS](https://amzn.to/4iwKesi) - Best in its Price Range -$25
* [Alfa AC1200](https://amzn.to/4iTrjYv) - Supports both 2.4 GHz and 5 GHz, bands - $58

### **Best Hacking Books**

* [Hacking: The Art of Exploitation, 2nd Edition](https://amzn.to/3FwAi3z)
* [OSINT Techniques: Resources for Uncovering Online Information](https://amzn.to/4bxUMF8)
* [Hacking APIs: Breaking Web Application Programming Interfaces](https://amzn.to/4bv93T4)
* [The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws](https://amzn.to/41UvtIO)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://ceh-practical.cavementech.com/additional-resources.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
