Attacking and Defending the computer networks
Learn how to attack networks and how to defend them from the most common attacks
Description
Welcome to my course on Computer Networks hacking and security. During this course, not only will I weaponize you with the red sword which will help you in penetration tests, but also give you a blue shield to help you in protecting your networks against these attacks.
While theoretical, this course never neglects practical examples. First, I will teach you the concepts of the technology using the "Photoshop" canvas as simple as I can, then I will show you the practical example of the attack on that technology using the "GNS3" emulator or a "Cisco Packet Tracer", where applicable. Then, we will develop the defense mechanism against the attack and make sure we are secure. All attacks shown in the course are real, efficient and work in the real life environment.
The course is divided in two parts:
introduction
attacking and defending
Here is a syllabus for the course:
Introduction, what is a computer network
IP and MAC addresses
NAT
ARP
ARP Poisoning and how to prevent it
How does a switch work? CAM Table
CAM Table overflow and how to prevent it
VLANs
Attacks on VLANs and their mitigation
DHCP
DHCP starvation/Rogue DHCP server, how to defend against them
Wi-Fi attacks and how to prevent them
By the end of the course you will be able to perform all the attacks and will have a knowledge about defending your network against them.
The course also contains "Quiz" es to help you in validating your knowledge
For any question, offer or dissatisfaction about the course, you are free to leave your message in the Q&A section and I will be happy to answer it. Let's make this course and the world better together!
You can also reach out by using the following email: s_simonovi@cu.edu.ge
Notes:
This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.
What You Will Learn!
- Perform the penetration test of the local network
- Obtain a knowledge about mitigation and security mechanisms to protect the LAN
- Obtain a knowledge about how LAN's work
- Gain the ability to describe network processes according to the OSI model
Who Should Attend!
- Beginner ethical hackers, beginner network engineers and anyone who wants to deepen their knowledge of how the computer networks operate.