IT & Software

Attacking and Defending the computer networks

Course overview

  • Perform the penetration test of the local network
  • Obtain a knowledge about mitigation and security mechanisms to protect the LAN
  • Obtain a knowledge about how LAN’s work
  • Gain the ability to describe network processes according to the OSI model

What you’ll learn

  • Perform the penetration test of the local network
  • Obtain a knowledge about mitigation and security mechanisms to protect the LAN
  • Obtain a knowledge about how LAN’s work
  • Gain the ability to describe network processes according to the OSI model

Description

Welcome to my course on Computer Networks hacking and security. During this course, not only will I weaponize you with the red sword which will help you in penetration tests, but also give you a blue shield to help you in protecting your networks against these attacks.

While theoretical, this course never neglects practical examples. First, I will teach you the concepts of the technology using the “Photoshop” canvas as simple as I can, then I will show you the practical example of the attack on that technology using the “GNS3” emulator or a “Cisco Packet Tracer”, where applicable. Then, we will develop the defense mechanism against the attack and make sure we are secure. All attacks shown in the course are real, efficient and work in the real life environment.

The course is divided in two parts:

  • introduction
  • attacking and defending

Here is a syllabus for the course:

  • Introduction, what is a computer network
  • IP and MAC addresses
  • NAT
  • ARP
  • ARP Poisoning and how to prevent it
  • How does a switch work? CAM Table
  • CAM Table overflow and  how to prevent it
  • VLANs
  • Attacks on VLANs and their mitigation
  • DHCP
  • DHCP starvation/Rogue DHCP server, how to defend against them
  • Wi-Fi attacks and how to prevent them


By the end of the course you will be able to perform all the attacks and will have a knowledge about defending your network against them.

The course also contains “Quiz” es to help you in validating your knowledge

For any questionoffer or dissatisfaction about the course, you are free to leave your message in the Q&A section and I will be happy to answer it. Let’s make this course and the world better together!

Notes:

  • This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.

Who this course is for:

  • Beginner ethical hackers, beginner network engineers and anyone who wants to deepen their knowledge of how the computer networks operate.

Requirements

  • Basic experience with the computer.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button

AdBlocks

Turn off the ad blocker