Ethical Hacking by Mohuya Chakraborty
Posted on 12 Apr 10:01 | by huayting | 25 views
Ethical Hacking by Mohuya Chakraborty
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 ChGenre: eLearning | Language: English + srt | Duration: 21 lectures (2h 3m) | Size: 1 GB
A Practical Approach
Define ethical hacking
Steps of penetration testing
Network basics
Hands on experience with analyzing network traffic
Hands on experience with WiFi cracking
IP Spoofing and MAC spoofing
Network Identifiers
Fake Authentication
Information Security Laws & Standards
Network Attack Vectors
WEP and WPA Protocols for Wireless Network Security
Hands on experience with Network Mapping and Port Scanning
No programming experience needed.
You will learn everything here as you proceed.
This is a bner level course on ethical hacking. The course is divided into 4 sections each comprising of 4-6 lectures followed by practice quiz. The graded quiz at the end of the course would enable the learners to judge about their understanding of the subject and learning curve. The topics include ethical hacking concepts, penetration testing, attack vectors, computer networking basics including networking devices, area networks, topologies, IP addressing, spoofing, sniffing, network mapper, wireless networks, wireless modes and several hands-on practical sessions to give an insight into the depth of the subject matter.
The course details is a follows.
Section 1 is about Introduction to ethical hacking
In this section there are 4 lectures. The first lecture gives an outline of information security discussing about activities in the Internet in 60 secs, information security elements and the security functionality and usability triangle. The second lecture explains the various types of network attacks that can hamper your system. The third lecture explains the different stages of penetration testing used for ethical hacking. It also includes the information security laws and standards. The fourth lecture explains the basic concepts of hacking and how it is different from ethical hacking. The meaning of black hat, grey hat and white hat hackers are dealt with.
Section 2 is about Network Fundamentals
This section comprises of 4 lectures and one practical session. The first lecture explains networking basics including various networking devices, area networks and topologies. The second lecture explains about network identifiers followed by MAC addressing and MAC spoofing in lectures 3 and 4. The fifth video gives a hands-on practical session on MAC address chag.
Section 3 is about Wireless Network Fundamentals
The section comprises of 4 lectures and two practical sessions. Lecture 1 talks about wireless networks followed by wireless modes and packet sniffing in lectures 2 and 3. The fourth video gives a hands-on practical session on Wireshark Network Packet Analyzer. The next lecture explains network mapper followed by a hands-on practical session on NMAP Network Mapper.
Section 4 is about IP Fundamentals
The section comprises of 4 lectures and two practical sessions. Lecture 1 talks about IP spoofing followed by a hands-on practical session on IP address chag. The next 3 lectures explain wired equivalent privacy or WEP, Wireless application protocols WPA and WPA2 followed by fake authentication concepts. The section ends with a hands-on practical session on wi-fi cracking.
Bner network traffic analysts curious about ethical hacking.
PLEASE SUPPORT ME BY CLICK ONE OF MY LINKS IF YOU WANT BUYING OR EXTENDING YOUR ACCOUNT
https://nitro.download/view/CAC625F8B4CC0E3/PIh64y9J__Ethical_Ha.rar
https://nitro.download/view/CAC625F8B4CC0E3/PIh64y9J__Ethical_Ha.rar
https://rapidgator.net/file/03f11e7063a3f13788bffc0d8b1ac572/PIh64y9J__Ethical_Ha.rar.html
https://uploadgig.com/file/download/3c6C3F7a03Dbad72/PIh64y9J__Ethical_Ha.rar
Related News
System Comment
Information
Users of Visitor are not allowed to comment this publication.
Facebook Comment
Member Area
Top News