Advanced Ethical Hacking Bootcamp: Network Hacking & Security

7h 30m 1s
English
Paid

Elevate your ethical hacking skills to a new level by mastering network exploitation techniques - from Man-in-the-Middle attacks and DNS spoofing to router exploitation and creating your own payloads. Master real attack methods, bypass security systems, and gain the skills necessary for pentesting and working in the field of cybersecurity.

Read more about the course

What you will learn:

  • Conduct advanced network attacks such as MITM and DNS spoofing
  • Bypass router security with MAC address spoofing
  • Exploit vulnerabilities in key network protocols
  • Perform DoS attacks to test network resilience
  • Manipulate DHCP servers and disrupt network functionality
  • Crack weak cryptographic algorithms and extract plaintext data
  • Create exploits for network applications manually
  • Implement defense measures to prevent attacks

What to expect in the course

This course provides an in-depth education on network hacking techniques: you will learn to bypass security, identify vulnerabilities, and even write your own exploits. In addition to offensive techniques, you will also master defensive measures to protect networks from such threats.

In the spirit of Zero To Mastery, the course is based not only on theory but also on practice. You will apply real-world techniques, including MITM, DNS spoofing, and router exploitation. We will go beyond common tools - you will learn to reverse applications and write your own attack scripts.

What the course includes:

  • Network Basics - Understand how networks are structured and why they are vulnerable
  • DoS Attacks - Create your own tool and execute an attack
  • Router Filter Bypass - Master MAC spoofing
  • MITM Attacks - Intercept traffic between devices
  • DNS Attacks - Implement fake routes and tunnels
  • Protocol Vulnerabilities - Exploits based on IPv6 and other component errors
  • DHCP Attacks - Exhaust IP addresses or introduce a fake server
  • Router Hacking - Attack the most vulnerable element of the network
  • Weak Cryptography - Decrypt transmitted data
  • Manual Application Hacking - Create your own exploit for a remote attack
  • Network Defense - Learn to defend with IDS, custom tools, and best practices

Watch Online Advanced Ethical Hacking Bootcamp: Network Hacking & Security

Join premium to watch
Go to premium
# Title Duration
1 Advanced Ethical Hacking Bootcamp: Network Hacking & Security 01:45
2 Course Introduction 03:46
3 Structure of the Course 02:03
4 What is Networking? 03:45
5 Different Types of Networks 05:08
6 LAN vs. WAN 04:30
7 Understanding a Simple Network - Part 1 01:01
8 Mac Addresses 03:15
9 Routers, Switches, Modems 07:50
10 Client Server vs. Peer to Peer 03:15
11 Understanding a Simple Network - Part 2 01:02
12 Star Topology 02:27
13 Bus Topology 02:42
14 Ring Topology 02:33
15 Mesh Topology 01:47
16 Hybrid Topology 02:55
17 IP Addresses 05:34
18 Subnetting 06:42
19 Common Networking Commands 08:58
20 OSI (Open Systems Interconnection) Model 03:23
21 What Is a Protocol? 02:13
22 TCP/IP 04:38
23 HTTP, HTTPS 03:45
24 FTP 03:49
25 DNS 06:32
26 SSH 02:29
27 Other Common Protocols 02:43
28 Understanding a Simple Network - Part 3 02:17
29 Types Of Network Threats 04:20
30 Windows Firewall 08:30
31 Understanding a Simple Network - Part 4 01:12
32 DDoS Theory 09:26
33 DDoS 19:08
34 MAC Spoofing Theory 05:24
35 Mac Spoofing Access Control Bypass 11:24
36 MITM Theory 07:27
37 ArpSpoof Tool 13:37
38 Ettercap MITM 07:18
39 DNS Attacks 08:57
40 DNS Spoofing 19:23
41 DNS Tunnel 09:54
42 Vulnerabilities in Protocols 07:06
43 IPv6 Exploit 16:10
44 DHCP Attacks 07:14
45 DHCP Starvation 16:44
46 Rogue DHCP 08:04
47 Router Attacks 07:02
48 Router Attacks Practice 10:53
49 Weak Cryptography 05:42
50 Exploiting Vulnerable Encryption 17:41
51 Manually Exploiting Application Over the Network 03:33
52 Writing Exploit - Part 1 21:33
53 Writing Exploit - Part 2 14:13
54 Writing Exploit - Part 3 09:36
55 Exercise: Imposter Syndrome 02:57
56 Protecting the Network 07:56
57 HIDS and HIPS for ArpSpoof 30:37
58 Router Security Settings 05:53
59 Writing IDS Rules for Nmap Scan Detection 13:11
60 Using Drop Rule in Snort for IPS 07:23
61 Wireshark 06:28
62 Thank You! 01:18

Similar courses to Advanced Ethical Hacking Bootcamp: Network Hacking & Security

Bug Bounty - An Advanced Guide to Finding Good Bugs

Bug Bounty - An Advanced Guide to Finding Good Bugsudemy

Category: Others, Ethical Hacking / Penetration Testing
Duration 10 hours 26 seconds
The Complete Cyber Security Course : Hackers Exposed!

The Complete Cyber Security Course : Hackers Exposed!udemy

Category: Ethical Hacking / Penetration Testing, IT security
Duration 12 hours 6 minutes 52 seconds
Web security: Injection Attacks with Java & Spring Boot

Web security: Injection Attacks with Java & Spring Bootudemy

Category: JavaScript, Spring Boot, Spring Data, Ethical Hacking / Penetration Testing
Duration 8 hours 44 minutes 36 seconds
Ethical Hacking: Session Hijacking

Ethical Hacking: Session Hijackingpluralsight

Category: Ethical Hacking / Penetration Testing
Duration 3 hours 28 minutes 11 seconds