Ethical Hacking: Network Fundamentals & Network Layer Attacks
What you'll learn:
Ethical hacking involves a hacker agreeing with an organization or individual who authorizes the hacker to levy cyber attacks on a system.
Many hackers use the Linux operating system (OS) because Linux is a free and open-source OS, meaning that anyone can modify it. It’s easy to access.
The different types of hackers include white hat hackers who are ethical hackers and are authorized to hack systems, black hat hackers who are cybercriminals.
The Certified Ethical Hacker (CEH) certification exam supports and tests the knowledge of auditors, security officers, site administrators, security.
Network Layer Attacks
ARP Hands-On Practices
Using GNS3 Networks
Active Network Devices
Weakness of Network Devices
Penetration Testing tools such as Ettercap, Wireshark and etc.
Sniffing Data & Analysing HTTP Traffic via Wireshark
DHCP Starvation & DHCP Spoof
Penetration Testing of Network Devices
Becoming an ethical hacker involves learning at least one programming language and having a working knowledge of other common languages like Python, SQL, C++
Ethical hacking is legal because the hacker has full, expressed permission to test the vulnerabilities of a system
Passing the Certified Information Security Manager (CISM) exam indicates that the credentialed individual is an expert in the governance of information security
ARP Spoofing/ARP Poisonning
The “Man in the Middle” ( Mitm )
Attaching Kali to GNS3 Network
Using MITMf Against Real Networks
How to prepare the lab environment for hands-on experiments
Network Device Audits
Who this course is for:
Cyber Security analyst
Data Security Engineers
Understanding computer use and the Windows operating system