Introduction to Ethical Hacking and Computer Networking
A Practical Approach
Description
This is a beginner level course on ethical hacking and computer network. The course is divided into 4 sections each comprising of 4-6 lectures followed by practice quiz. The graded quiz at the end of the course would enable the learners to judge about their understanding of the subject and learning curve. The topics include ethical hacking concepts, penetration testing, attack vectors, computer networking basics including networking devices, area networks, topologies, IP addressing, spoofing, sniffing, network mapper, wireless networks, wireless modes and several hands-on practical sessions to give an insight into the depth of the subject matter.
The course details is a follows.
Section 1 is about Introduction to ethical hacking
In this section there are 4 lectures. The first lecture gives an outline of information security discussing about activities in the Internet in 60 secs, information security elements and the security functionality and usability triangle. The second lecture explains the various types of network attacks that can hamper your system. The third lecture explains the different stages of penetration testing used for ethical hacking. It also includes the information security laws and standards. The fourth lecture explains the basic concepts of hacking and how it is different from ethical hacking. The meaning of black hat, grey hat and white hat hackers are dealt with.
Section 2 is about Network Fundamentals
This section comprises of 4 lectures and one practical session. The first lecture explains networking basics including various networking devices, area networks and topologies. The second lecture explains about network identifiers followed by MAC addressing and MAC spoofing in lectures 3 and 4. The fifth video gives a hands-on practical session on MAC address changing.
Section 3 is about Wireless Network Fundamentals
The section comprises of 4 lectures and two practical sessions. Lecture 1 talks about wireless networks followed by wireless modes and packet sniffing in lectures 2 and 3. The fourth video gives a hands-on practical session on Wireshark Network Packet Analyzer. The next lecture explains network mapper followed by a hands-on practical session on NMAP Network Mapper.
Section 4 is about IP Fundamentals
The section comprises of 4 lectures and two practical sessions. Lecture 1 talks about IP spoofing followed by a hands-on practical session on IP address changing. The next 3 lectures explain wired equivalent privacy or WEP, Wireless application protocols WPA and WPA2 followed by fake authentication concepts. The section ends with a hands-on practical session on wi-fi cracking.
What You Will Learn!
- Define ethical hacking
- Steps of penetration testing
- Network basics
- Hands on experience with analyzing network traffic
- Hands on experience with WiFi cracking
- IP Spoofing and MAC spoofing
- Network Identifiers
- Fake Authentication
- Information Security Laws & Standards
- Network Attack Vectors
- WEP and WPA Protocols for Wireless Network Security
- Hands on experience with Network Mapping and Port Scanning
Who Should Attend!
- Beginner network traffic analysts curious about ethical hacking and networking basics