Advanced Ethical Hacking Bootcamp: Network Hacking & Security
Elevate your ethical hacking skills to a new level by mastering network exploitation techniques - from Man-in-the-Middle attacks and DNS spoofing to router exploitation and creating your own payloads. Master real attack methods, bypass security systems, and gain the skills necessary for pentesting and working in the field of cybersecurity.
Read more about the course
What you will learn:
- Conduct advanced network attacks such as MITM and DNS spoofing
- Bypass router security with MAC address spoofing
- Exploit vulnerabilities in key network protocols
- Perform DoS attacks to test network resilience
- Manipulate DHCP servers and disrupt network functionality
- Crack weak cryptographic algorithms and extract plaintext data
- Create exploits for network applications manually
- Implement defense measures to prevent attacks
What to expect in the course
This course provides an in-depth education on network hacking techniques: you will learn to bypass security, identify vulnerabilities, and even write your own exploits. In addition to offensive techniques, you will also master defensive measures to protect networks from such threats.
In the spirit of Zero To Mastery, the course is based not only on theory but also on practice. You will apply real-world techniques, including MITM, DNS spoofing, and router exploitation. We will go beyond common tools - you will learn to reverse applications and write your own attack scripts.
What the course includes:
- Network Basics - Understand how networks are structured and why they are vulnerable
- DoS Attacks - Create your own tool and execute an attack
- Router Filter Bypass - Master MAC spoofing
- MITM Attacks - Intercept traffic between devices
- DNS Attacks - Implement fake routes and tunnels
- Protocol Vulnerabilities - Exploits based on IPv6 and other component errors
- DHCP Attacks - Exhaust IP addresses or introduce a fake server
- Router Hacking - Attack the most vulnerable element of the network
- Weak Cryptography - Decrypt transmitted data
- Manual Application Hacking - Create your own exploit for a remote attack
- Network Defense - Learn to defend with IDS, custom tools, and best practices
Watch Online Advanced Ethical Hacking Bootcamp: Network Hacking & Security
# | Title | Duration |
---|---|---|
1 | Advanced Ethical Hacking Bootcamp: Network Hacking & Security | 01:45 |
2 | Course Introduction | 03:46 |
3 | Structure of the Course | 02:03 |
4 | What is Networking? | 03:45 |
5 | Different Types of Networks | 05:08 |
6 | LAN vs. WAN | 04:30 |
7 | Understanding a Simple Network - Part 1 | 01:01 |
8 | Mac Addresses | 03:15 |
9 | Routers, Switches, Modems | 07:50 |
10 | Client Server vs. Peer to Peer | 03:15 |
11 | Understanding a Simple Network - Part 2 | 01:02 |
12 | Star Topology | 02:27 |
13 | Bus Topology | 02:42 |
14 | Ring Topology | 02:33 |
15 | Mesh Topology | 01:47 |
16 | Hybrid Topology | 02:55 |
17 | IP Addresses | 05:34 |
18 | Subnetting | 06:42 |
19 | Common Networking Commands | 08:58 |
20 | OSI (Open Systems Interconnection) Model | 03:23 |
21 | What Is a Protocol? | 02:13 |
22 | TCP/IP | 04:38 |
23 | HTTP, HTTPS | 03:45 |
24 | FTP | 03:49 |
25 | DNS | 06:32 |
26 | SSH | 02:29 |
27 | Other Common Protocols | 02:43 |
28 | Understanding a Simple Network - Part 3 | 02:17 |
29 | Types Of Network Threats | 04:20 |
30 | Windows Firewall | 08:30 |
31 | Understanding a Simple Network - Part 4 | 01:12 |
32 | DDoS Theory | 09:26 |
33 | DDoS | 19:08 |
34 | MAC Spoofing Theory | 05:24 |
35 | Mac Spoofing Access Control Bypass | 11:24 |
36 | MITM Theory | 07:27 |
37 | ArpSpoof Tool | 13:37 |
38 | Ettercap MITM | 07:18 |
39 | DNS Attacks | 08:57 |
40 | DNS Spoofing | 19:23 |
41 | DNS Tunnel | 09:54 |
42 | Vulnerabilities in Protocols | 07:06 |
43 | IPv6 Exploit | 16:10 |
44 | DHCP Attacks | 07:14 |
45 | DHCP Starvation | 16:44 |
46 | Rogue DHCP | 08:04 |
47 | Router Attacks | 07:02 |
48 | Router Attacks Practice | 10:53 |
49 | Weak Cryptography | 05:42 |
50 | Exploiting Vulnerable Encryption | 17:41 |
51 | Manually Exploiting Application Over the Network | 03:33 |
52 | Writing Exploit - Part 1 | 21:33 |
53 | Writing Exploit - Part 2 | 14:13 |
54 | Writing Exploit - Part 3 | 09:36 |
55 | Exercise: Imposter Syndrome | 02:57 |
56 | Protecting the Network | 07:56 |
57 | HIDS and HIPS for ArpSpoof | 30:37 |
58 | Router Security Settings | 05:53 |
59 | Writing IDS Rules for Nmap Scan Detection | 13:11 |
60 | Using Drop Rule in Snort for IPS | 07:23 |
61 | Wireshark | 06:28 |
62 | Thank You! | 01:18 |
Similar courses to Advanced Ethical Hacking Bootcamp: Network Hacking & Security

Bug Bounty - An Advanced Guide to Finding Good Bugsudemy

The Complete Cyber Security Course : Hackers Exposed!udemy

Web security: Injection Attacks with Java & Spring Bootudemy
