Ethical Hacking: Securing & Countering Network Layer Attacks
in Network & Security
Created by
Muharrem AYDIN
About this course
Course Description: Ethical Hacking: Securing Networks & Countering Network Layer Attacks
In the digital age, network security is paramount. This comprehensive course on Ethical Hacking focuses on securing networks and countering network layer attacks, providing you with the essential skills to protect and defend against malicious threats.
Course Objectives:
Understanding Network Security Basics:
- Learn the fundamentals of network security, including key concepts, terminology, and protocols.
- Explore the architecture and components of secure networks.
Identifying Network Layer Attacks:
- Gain insights into various types of network layer attacks such as DoS/DDoS, IP spoofing, MITM, and session hijacking.
- Understand the mechanics and impact of these attacks on network infrastructure.
Implementing Defensive Measures:
- Develop strategies to prevent and mitigate network layer attacks.
- Learn to configure firewalls, intrusion detection/prevention systems (IDS/IPS), and other security appliances.
Ethical Hacking Techniques:
- Master ethical hacking methodologies and tools used to test network security.
- Conduct vulnerability assessments and penetration testing on network systems.
Hands-on Labs and Real-world Scenarios:
- Engage in practical lab exercises to apply your knowledge in real-world scenarios.
- Simulate attacks and defenses to understand the dynamics of network security.
Legal and Ethical Considerations:
- Discuss the legal and ethical responsibilities of an ethical hacker.
- Learn about compliance requirements and industry standards in network security.
Who Should Enroll:
- IT Security Professionals:
- Enhance your skills in securing network environments and countering attacks.
- Network Administrators:
- Gain a deeper understanding of potential threats and defensive techniques.
- Aspiring Ethical Hackers:
- Build a solid foundation in ethical hacking with a focus on network security.
- Cybersecurity Enthusiasts:
- Learn practical skills to protect networks from evolving threats.
By the end of this course, you will be equipped with the knowledge and skills to secure network infrastructures effectively and counter network layer attacks, ensuring robust protection against cyber threats. Join us to become a proficient ethical hacker and network security expert.
Comments (0)
01 - Network Fundamentals
2 Parts
0006 Designer vs Developer
2.32 MB
001 Course Introduction and What the Course is
-
02 - Reference Models
5 Parts
001 What is “Protocol”
-
002 Reference Models
-
003 OSI Reference Model
-
004 OSI vs TCPIP
-
005 Demonstration using Wireshark
-
03 - Data Link Layer ( Layer 2 )
6 Parts
001 Standards & Protocols
-
002 Ethernet Principles, Frame & Headers
-
003 ARP ( Address Resolution Protocol ) Mechanism, ARP Tables, ARP Packets
-
004 ARP Hand-On Practices
-
005 VLANs – Virtual Local Area Networks
-
006 WLANs – Wireless Local Area Networks
-
04 - Network Layer ( Layer 3 )
15 Parts
001 Introduction to Network Layer
-
002 Internet Protocol - IP
-
003 IPv4 Adressing System
-
004 IPv4 Packet Header
-
005 IPv4 Subnetting Classful Networks
-
006 IPv4 Subnetting Subnet Mask
-
007 IPv4 Subnetting Understanding
-
008 IPv4 Shortage
-
009 Private Networks
-
010 Private Networks - Demonstration
-
011 NAT – Network Address Translation
-
012 IPv6, Packet Header & Addressing
-
013 DHCP - How the Mechanism Works
-
014 ICMP – Internet Control Message Protocol
-
015 Traceroute
-
05 - Transport Layer ( Layer 4 )
4 Parts
001 Introduction to Transport Layer
-
002 TCP – Transmission Control Protocol
-
003 TCP Header
-
004 UDP – User Datagram Protocol
-
06 - Application Layer (Layer 5-7)
5 Parts
001 Introduction to Application Layer
-
002 DNS – Domain Name System
-
003 HTTP ( Hyper Text Transfer Protocol )
-
004 HTTPS
-
005 Checklist - What We Have Learned
-
07 - Network & Data Link Layer (Layer 2) Attacks
1 Parts
001 What is Covered
-
08 - Setting Up the Laboratory
19 Parts
001 Laboratory and Virtual Platforms
-
003 Lab's Architecture Diagram
-
005 Install & Run Oracle VM VirtualBox
-
006 Installing Kali using the VMware Image - Step 1
-
007 Installing Kali using the VMware Image - Step 2
-
008 Installing Kali using the VMware Image - Step 3
-
009 Installing Kali using the ISO file for VMware - Step 1
-
010 Installing Kali using the ISO file for VMware - Step 2
-
011 Installing Kali using the ISO file for VMware - Step 3
-
012 Installing Kali on VirtualBox using the OVA file - Step 1
-
013 Installing Kali on VirtualBox using the OVA file - Step 2
-
014 Installing Kali on VirtualBox using the OVA file - Step 3
-
015 Installing Kali using the ISO file for VirtualBox - Step 1
-
016 Installing Kali using the ISO file for VirtualBox - Step 2
-
017 Installing Kali using the ISO file for VirtualBox - Step 3
-
019 Download & Install OWASPBWA
-
020 Free MS Windows Virtual Machines in VMware Fusion
-
021 Free MS Windows Virtual Machines in Oracle VM VirtualBox
-
022 Configuring NAT Network in Oracle VM VirtualBox
-
09 - Using GNS3 and Creating a GNS3 Networks
6 Parts
001 Download & Install
-
002 Setting Up the First Project
-
003 GNS3 Environment
-
004 Building GNS3 Network
-
005 Attach Kali (or another VM) to the GNS3 Network
-
006 Configuring Switch & Router (Cisco) and creating VLANs
-
10 - Network Sniffing The “Man in the Middle” (MitM)
6 Parts
001 MitM Listening to the traffic
-
002 Sniffing
-
003 TCPDump
-
004 Wireshark Capturing the Traffic
-
005 Wireshark Following Stream
-
006 Wireshark Summarise Network
-
11 - Active Network Devices in Network Security
1 Parts
001 Router, Switch, Hub
-
12 - Expanding Sniffing Space
13 Parts
001 How to Expand Sniffing Space
-
002 MAC Flood Switching
-
003 MAC Flood Using Macof Tool
-
004 MacFlood - Countermeasures
-
005 ARP Spoof
-
006 ARP Cache Poisoning using Ettercap
-
007 DHCP Starvation & DHCP Spoofing
-
008 DHCP Mechanism
-
009 DHCP Starvation - Scenario
-
010 DHCP Starvation Demonstration with Yersinia
-
011 VLAN Hopping
-
012 VLAN Hopping Switch Spoofing
-
013 VLAN Hopping Double Tagging
-
13 - Penetration Testing of Network Devices
8 Parts
001 Reconnaissance Finding Open Ports & Services Using NMAP
-
002 Password Cracking
-
003 Online SSH Password Cracking Using Hydra
-
004 Compromising SNMP What is SNMP
-
005 Compromising SNMP Finding Community Names Using NMAP Scripts
-
006 Compromising SNMP Write Access Check Using SNMP-Check Tool
-
007 Compromising SNMP Grabbing SNMP Configuration Using Metasploit
-
008 Weaknesses of network devices
-
14 - Auditing Network Devices
4 Parts
001 Password Creation Methods of Cisco Routers
-
002 Identity Management
-
003 ACL – Access Control Lists
-
004 SNMP Security
-
0
0 Reviews