Introduction to Ethical Hacking with Computer Network Basics | Udemy


Introduction to Ethical Hacking with Computer Network Basics | Udemy
English | Size: 1,010.18 MB
Genre: eLearning

What you’ll learn
Define ethical hacking
Steps of penetration testing
Network basics
Hands on experience with analyzing network traffic
Hands on experience with WiFi cracking
IP Spoofing and MAC spoofing
Network Identifiers
Fake Authentication
Information Security Laws & Standards
Network Attack Vectors
WEP and WPA Protocols for Wireless Network Security
Hands on experience with Network Mapping and Port Scanning

This is a beginner level course on ethical hacking and computer network. The course is divided into 4 sections each comprising of 4-6 lectures followed by practice quiz. The graded quiz at the end of the course would enable the learners to judge about their understanding of the subject and learning curve. The topics include ethical hacking concepts, penetration testing, attack vectors, computer networking basics including networking devices, area networks, topologies, IP addressing, spoofing, sniffing, network mapper, wireless networks, wireless modes and several hands-on practical sessions to give an insight into the depth of the subject matter.

The course details is a follows.

Section 1 is about Introduction to ethical hacking

In this section there are 4 lectures. The first lecture gives an outline of information security discussing about activities in the Internet in 60 secs, information security elements and the security functionality and usability triangle. The second lecture explains the various types of network attacks that can hamper your system. The third lecture explains the different stages of penetration testing used for ethical hacking. It also includes the information security laws and standards. The fourth lecture explains the basic concepts of hacking and how it is different from ethical hacking. The meaning of black hat, grey hat and white hat hackers are dealt with.

Section 2 is about Network Fundamentals

This section comprises of 4 lectures and one practical session. The first lecture explains networking basics including various networking devices, area networks and topologies. The second lecture explains about network identifiers followed by MAC addressing and MAC spoofing in lectures 3 and 4. The fifth video gives a hands-on practical session on MAC address changing.

Section 3 is about Wireless Network Fundamentals

The section comprises of 4 lectures and two practical sessions. Lecture 1 talks about wireless networks followed by wireless modes and packet sniffing in lectures 2 and 3. The fourth video gives a hands-on practical session on Wireshark Network Packet Analyzer. The next lecture explains network mapper followed by a hands-on practical session on NMAP Network Mapper.

Section 4 is about IP Fundamentals

The section comprises of 4 lectures and two practical sessions. Lecture 1 talks about IP spoofing followed by a hands-on practical session on IP address changing. The next 3 lectures explain wired equivalent privacy or WEP, Wireless application protocols WPA and WPA2 followed by fake authentication concepts. The section ends with a hands-on practical session on wi-fi cracking.

Who this course is for:
Beginner network traffic analysts curious about ethical hacking and networking basics

nitro.download/view/0DF39F4A91E0DC2/UD-IntroductiontoEthicalHackingwithComputerNetworkBasics.4.5.1.part1.rar
nitro.download/view/3029C4CFE3DEBB9/UD-IntroductiontoEthicalHackingwithComputerNetworkBasics.4.5.1.part2.rar
nitro.download/view/4D16CB7B5225311/UD-IntroductiontoEthicalHackingwithComputerNetworkBasics.4.5.1.part3.rar

rapidgator.net/file/1353f0a3a6f60d8aeabb82e25aeb2ae9/UD-IntroductiontoEthicalHackingwithComputerNetworkBasics.4.5.1.part1.rar.html
rapidgator.net/file/a3448e6b7812bca8cf090168326a47b7/UD-IntroductiontoEthicalHackingwithComputerNetworkBasics.4.5.1.part2.rar.html
rapidgator.net/file/23e27bdb49ba30f53b9470c6955d1246/UD-IntroductiontoEthicalHackingwithComputerNetworkBasics.4.5.1.part3.rar.html

If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.