2015
Udemy / infySEC UK
1:58
English
Hi and welcome to our Network hacking and security course.
In this course, we will teach you how wired and wireless network attacks are performed in a simulated/test environment in an ethical way. This course helps the network security professional to mitigate these attack using the recommended solution at the end of each module.
You will be encouraged to practice what you have learned in a simulated environment via our practice "Audio Visual Exercise" session.
Section 1: INTRODUCTION
Lecture 1
Network Objective and Outcome
00:43
Lecture 2
Network Basics
16:20
Quiz 1
Network Basics
3 the question(s)
Lecture 3
Introduction - Network hacking and security
01:52
Section 2: Physical Layer Attacks - Wired
Lecture 4
Physical Layer Attack
01:58
Quiz 2
Physical Layer-Wired
2 question(s)
Lecture 5
Mitigation technique-Physical layer security
1 slide
Section 3: Datalink Layer Attacks - Wired
Lecture 6
MAC Spoofing
00:56
Lecture 7
Exercise-MAC Spoofing
00:53
Lecture 8
MAC Flooding
02:09
Lecture 9
Exercise is MAC Flooding
00:48
Lecture 10
ARP Poisoning
01:59
Lecture 11
Exercise-ARP Poisoning
01:27
Lecture 12
DNS Spoofing
02:05
Lecture 13
Exercise is DNS Spoofing
01:33
Lecture 14
DHCP music from starvation
02:36
Quiz 3
DHCP music from starvation
3 the question(s)
Lecture 15
Rogue DHCP Attack
04:10
Quiz 4
Rogue DHCP Attack
6 the question(s)
Lecture 16
Mitigation technique-Datalink layer security
6 slide(s)
Section 4: Network Layer Attacks
Lecture 17
IP Spoofing
01:28
Lecture 18
Exercise is IP Spoofing
00:42
Lecture 19
Passive MITM
01:32
Lecture 20
Active MITM
00:47
Lecture 21
Exercise-MITM
02:50
Lecture 22
ICMP Flooding
01:15
Lecture 23
Exercise-ICMP Flooding
00:58
Lecture 24
SMURF Attack
01:44
Lecture 25
Exercise-Smurf Attack
01:10
Lecture 26
Ping of Death
01:00
Quiz 5
Ping of Death Attack
1 question
Lecture 27
Mitigation technique-Network layer security
4 slide(s)
Section 5: Transport Layer Attacks
Lecture 28
Transport Layer
01:53
Lecture 29
TCP Flooding
02:55
Lecture 30
Exercise-TCP Flooding
01:12
Lecture 31
UDP Flooding
02:08
Lecture 32
Exercise-UDP Flooding
00:58
Lecture 33
Mitigation technique-Transport layer security
2 slide(s)
Section 6: Wireless Network Attacks
Lecture 34
Wireless Basics
03:37
Lecture 35
Introduction to Wireless Hacking and Security
01:07
Section 7: Physical Layer Attacks - Wireless
Lecture 36
Physcial Layer Attack
01:45
Quiz 6
Physical Layer-Wireless
2 question(s)
Lecture 37
Mitigation technique-Wireless-Physical layer security
1 slide
Section 8: Datalink Layer Attacks - Wireless
Lecture 38
War Driving
03:08
Lecture 39
Hidden Hotspot
03:39
Lecture 40
Exercise Pre-Requisite
00:24
Lecture 41
Exercise-Hidden hotspot
01:13
Section 9: Datalink Layer Attacks - WEP Cracking
Lecture 42
WEP Working
02:05
Lecture 43
Packet Injection
02:44
Lecture 44
Exercise-WEP Packet Injection
02:18
Lecture 45
Caffe Latte
03:13
Lecture 46
Exercise-Caffe Latte Attack
01:37
Lecture 47
Hirte Attack
02:42
Lecture 48
Exercise-Hirte attack
01:25
Lecture 49
Koreks chop chop
04:24
Lecture 50
Exercise-Korek'ChopChop s
01:58
Section 10: Datalink Layer Attacks - WPA Cracking
Lecture 51
WPA Working
03:17
Lecture 52
WPA Cracking
02:42
Lecture 53
Exercise-WPA Cracking
01:25
Section 11: Datalink Layer Attacks - Cracking WPA II
Lecture 54
WPA 2 Basics
01:18
Lecture 55
WPA 2 Cracking
02:04
Lecture 56
Exercise-WPA Cracking 2
01:23
Lecture 57
Rogue AP attack
04:27
Lecture 58
Exercise-Rouge Ap
01:58
Lecture 59
Mitigation technique-Wireless-Datalink layer security
2 slide(s)
udemy.com/network-hacking
Download File Size:521.27 MB