Attacking and Defending the computer networks

Learn how to attack networks and how to defend them from the most common attacks

Ratings 5.00 / 5.00
Attacking and Defending the computer networks

What You Will Learn!

  • Perform the penetration test of the local network
  • Obtain a knowledge about mitigation and security mechanisms to protect the LAN
  • Obtain a knowledge about how LAN's work
  • Gain the ability to describe network processes according to the OSI model

Description

Welcome to my course on Computer Networks hacking and security. During this course, not only will I weaponize you with the red sword which will help you in penetration tests, but also give you a blue shield to help you in protecting your networks against these attacks.

While theoretical, this course never neglects practical examples. First, I will teach you the concepts of the technology using the "Photoshop" canvas as simple as I can, then I will show you the practical example of the attack on that technology using the "GNS3" emulator or a "Cisco Packet Tracer", where applicable. Then, we will develop the defense mechanism against the attack and make sure we are secure. All attacks shown in the course are real, efficient and work in the real life environment.

The course is divided in two parts:

  • introduction

  • attacking and defending

Here is a syllabus for the course:


  • Introduction, what is a computer network

  • IP and MAC addresses

  • NAT

  • ARP

  • ARP Poisoning and how to prevent it

  • How does a switch work? CAM Table

  • CAM Table overflow and  how to prevent it

  • VLANs

  • Attacks on VLANs and their mitigation

  • DHCP

  • DHCP starvation/Rogue DHCP server, how to defend against them

  • Wi-Fi attacks and how to prevent them


By the end of the course you will be able to perform all the attacks and will have a knowledge about defending your network against them.

The course also contains "Quiz" es to help you in validating your knowledge

For any question, offer or dissatisfaction about the course, you are free to leave your message in the Q&A section and I will be happy to answer it. Let's make this course and the world better together!

You can also reach out by using the following email: s_simonovi@cu.edu.ge

Notes:

  • This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.

Who Should Attend!

  • Beginner ethical hackers, beginner network engineers and anyone who wants to deepen their knowledge of how the computer networks operate.

TAKE THIS COURSE

Tags

  • Network Security

Subscribers

12

Lectures

16

TAKE THIS COURSE



Related Courses