Tutorialspoint

Ethical Hacking Fundamentals With Essentials of Computer Networking

A Hands-on Approach

  Dr. Mohuya Chakraborty (PhD)

   Ethical Hacking, Cyber Security, IT Networking Fundamentals, Penetration Testing, IT & Software

  Language - English

   Published on 06/2022

0

Description

This is a beginner level course on ethical hacking and computer network. The course is divided into 4 sections each comprising of 4-6 lectures followed by practice quiz. The graded quiz at the end of the course would enable the learners to judge about their understanding of the subject and learning curve. The topics include ethical hacking concepts, penetration testing, attack vectors, computer networking basics including networking devices, area networks, topologies, IP addressing, spoofing, sniffing, network mapper, wireless networks, wireless modes and several hands-on practical sessions to give an insight into the depth of the subject matter.

The course details is a follows.

Section 1 is about Introduction to ethical hacking

In this section there are 4 lectures. The first lecture gives an outline of information security discussing about activities in the Internet in 60 secs, information security elements and the security functionality and usability triangle. The second lecture explains the various types of network attacks that can hamper your system. The third lecture explains the different stages of penetration testing used for ethical hacking. It also includes the information security laws and standards. The fourth lecture explains the basic concepts of hacking and how it is different from ethical hacking. The meaning of black hat, grey hat and white hat hackers are dealt with.

Section 2 is about Network Fundamentals

This section comprises of 4 lectures and one practical session. The first lecture explains networking basics including various networking devices, area networks and topologies. The second lecture explains about network identifiers followed by MAC addressing and MAC spoofing in lectures 3 and 4. The fifth video gives a hands-on practical session on MAC address changing.

Section 3 is about Wireless Network Fundamentals

The section comprises of 4 lectures and two practical sessions. Lecture 1 talks about wireless networks followed by wireless modes and packet sniffing in lectures 2 and 3. The fourth video gives a hands-on practical session on Wireshark Network Packet Analyzer. The next lecture explains network mapper followed by a hands-on practical session on NMAP Network Mapper.

Section 4 is about IP Fundamentals

The section comprises of 4 lectures and two practical sessions. Lecture 1 talks about IP spoofing followed by a hands-on practical session on IP address changing. The next 3 lectures explain wired equivalent privacy or WEP, Wireless application protocols WPA and WPA2 followed by fake authentication concepts. The section ends with a hands-on practical session on wi-fi cracking.

What Will I Get ?

  • Beginner network traffic analysts curious about ethical hacking and networking basics.
  • Define ethical hacking
  • Steps of penetration testing
  • Network basics
  • Hands on experience with analyzing network traffic
  • Hands on experience with WiFi cracking
  • IP Spoofing and MAC spoofing
  • Network Identifiers
  • Fake Authentication
  • Information Security Laws & Standards
  • Network Attack Vectors
  • WEP and WPA Protocols for Wireless Network Security
  • Hands on experience with Network Mapping and Port Scanning

Requirements

  • No programming experience needed. You will learn about computer network basics and procedure for network analysis here as you proceed.
  • Prior knowledge of computer networks will be advantageous.


0
Course Rating
0%
0%
0%
0%
0%

    Feedbacks (0)

  • No Feedbacks Yet..!
Ethical Hacking Fundamentals With Essentials of Computer Networking
This Course Includes :

2.5 hours

33 Lectures

20 Quiz Questions

Lifetime Access

30-Days Money Back Guarantee

We make use of cookies to improve our user experience. By using this website, you agree with our Cookies Policy.