Skip to main content

Advanced Ethical Hacking Bootcamp: Network Hacking & Security

7h 30m 1s
English
Paid

Course description

Elevate your ethical hacking skills to a new level by mastering network exploitation techniques - from Man-in-the-Middle attacks and DNS spoofing to router exploitation and creating your own payloads. Master real attack methods, bypass security systems, and gain the skills necessary for pentesting and working in the field of cybersecurity.

Read more about the course

What you will learn:

  • Conduct advanced network attacks such as MITM and DNS spoofing
  • Bypass router security with MAC address spoofing
  • Exploit vulnerabilities in key network protocols
  • Perform DoS attacks to test network resilience
  • Manipulate DHCP servers and disrupt network functionality
  • Crack weak cryptographic algorithms and extract plaintext data
  • Create exploits for network applications manually
  • Implement defense measures to prevent attacks

What to expect in the course

This course provides an in-depth education on network hacking techniques: you will learn to bypass security, identify vulnerabilities, and even write your own exploits. In addition to offensive techniques, you will also master defensive measures to protect networks from such threats.

In the spirit of Zero To Mastery, the course is based not only on theory but also on practice. You will apply real-world techniques, including MITM, DNS spoofing, and router exploitation. We will go beyond common tools - you will learn to reverse applications and write your own attack scripts.

What the course includes:

  • Network Basics - Understand how networks are structured and why they are vulnerable
  • DoS Attacks - Create your own tool and execute an attack
  • Router Filter Bypass - Master MAC spoofing
  • MITM Attacks - Intercept traffic between devices
  • DNS Attacks - Implement fake routes and tunnels
  • Protocol Vulnerabilities - Exploits based on IPv6 and other component errors
  • DHCP Attacks - Exhaust IP addresses or introduce a fake server
  • Router Hacking - Attack the most vulnerable element of the network
  • Weak Cryptography - Decrypt transmitted data
  • Manual Application Hacking - Create your own exploit for a remote attack
  • Network Defense - Learn to defend with IDS, custom tools, and best practices

Watch Online

This is a demo lesson (10:00 remaining)

You can watch up to 10 minutes for free. Subscribe to unlock all 62 lessons in this course and access 10,000+ hours of premium content across all courses.

View Pricing
0:00
/
#1: Advanced Ethical Hacking Bootcamp: Network Hacking & Security

All Course Lessons (62)

#Lesson TitleDurationAccess
1
Advanced Ethical Hacking Bootcamp: Network Hacking & Security Demo
01:45
2
Course Introduction
03:46
3
Structure of the Course
02:03
4
What is Networking?
03:45
5
Different Types of Networks
05:08
6
LAN vs. WAN
04:30
7
Understanding a Simple Network - Part 1
01:01
8
Mac Addresses
03:15
9
Routers, Switches, Modems
07:50
10
Client Server vs. Peer to Peer
03:15
11
Understanding a Simple Network - Part 2
01:02
12
Star Topology
02:27
13
Bus Topology
02:42
14
Ring Topology
02:33
15
Mesh Topology
01:47
16
Hybrid Topology
02:55
17
IP Addresses
05:34
18
Subnetting
06:42
19
Common Networking Commands
08:58
20
OSI (Open Systems Interconnection) Model
03:23
21
What Is a Protocol?
02:13
22
TCP/IP
04:38
23
HTTP, HTTPS
03:45
24
FTP
03:49
25
DNS
06:32
26
SSH
02:29
27
Other Common Protocols
02:43
28
Understanding a Simple Network - Part 3
02:17
29
Types Of Network Threats
04:20
30
Windows Firewall
08:30
31
Understanding a Simple Network - Part 4
01:12
32
DDoS Theory
09:26
33
DDoS
19:08
34
MAC Spoofing Theory
05:24
35
Mac Spoofing Access Control Bypass
11:24
36
MITM Theory
07:27
37
ArpSpoof Tool
13:37
38
Ettercap MITM
07:18
39
DNS Attacks
08:57
40
DNS Spoofing
19:23
41
DNS Tunnel
09:54
42
Vulnerabilities in Protocols
07:06
43
IPv6 Exploit
16:10
44
DHCP Attacks
07:14
45
DHCP Starvation
16:44
46
Rogue DHCP
08:04
47
Router Attacks
07:02
48
Router Attacks Practice
10:53
49
Weak Cryptography
05:42
50
Exploiting Vulnerable Encryption
17:41
51
Manually Exploiting Application Over the Network
03:33
52
Writing Exploit - Part 1
21:33
53
Writing Exploit - Part 2
14:13
54
Writing Exploit - Part 3
09:36
55
Exercise: Imposter Syndrome
02:57
56
Protecting the Network
07:56
57
HIDS and HIPS for ArpSpoof
30:37
58
Router Security Settings
05:53
59
Writing IDS Rules for Nmap Scan Detection
13:11
60
Using Drop Rule in Snort for IPS
07:23
61
Wireshark
06:28
62
Thank You!
01:18

Unlock unlimited learning

Get instant access to all 61 lessons in this course, plus thousands of other premium courses. One subscription, unlimited knowledge.

Learn more about subscription

Comments

0 comments

Want to join the conversation?

Sign in to comment

Similar courses

The Complete Cyber Security Course : Hackers Exposed!

The Complete Cyber Security Course : Hackers Exposed!

Sources: udemy
Learn a practical skill-set in defeating all online threats, including - advanced hackers, trackers, malware, zero days, exploit kits, cybercriminals and more. Become a Cyber Se...
12 hours 6 minutes 52 seconds
Ethical Hacking: Session Hijacking

Ethical Hacking: Session Hijacking

Sources: pluralsight
Pluralsight is not an official partner or accredited training center of EC-Council. Session persistence is a fundamental concept in information systems. On the web, for example,...
3 hours 28 minutes 11 seconds
Bug Bounty - An Advanced Guide to Finding Good Bugs

Bug Bounty - An Advanced Guide to Finding Good Bugs

Sources: udemy
Bug bounties are evolving year after year and thousands of infosec enthuasiasts are looking to join the boat. Having a great place on that boat requires dedicat
10 hours 26 seconds
Web security: Injection Attacks with Java & Spring Boot

Web security: Injection Attacks with Java & Spring Boot

Sources: udemy
Are you a Java web developer and want to write secure code? Do you want to learn Ethical hacking and Web application security? With this hands-on injection attacks course you w...
8 hours 44 minutes 36 seconds