Companies Home Search Profile

Ethical Hacking: Sniffers

Focused View

Lisa Bock

2:08:39

94 View
  • 01 - Visualizing network traffic.mp4
    00:47
  • 02 - What you should know.mp4
    01:05
  • 03 - Hacking ethically.mp4
    00:57
  • 01 - Sniffing network traffic.mp4
    03:17
  • 02 - Using other sniffing tools.mp4
    03:05
  • 03 - Dissecting the OSI model.mp4
    05:52
  • 04 - Comparing passive and active attacks.mp4
    04:26
  • 05 - Using Wireshark.mp4
    07:00
  • 06 - Tapping into the data stream.mp4
    03:39
  • 01 - Launching a macof attack.mp4
    03:27
  • 02 - Exploiting Layer 2 protocols.mp4
    03:47
  • 03 - Spoofing a MAC address.mp4
    03:39
  • 04 - Defending against MAC attacks.mp4
    03:36
  • 05 - VLAN hopping attack.mp4
    02:59
  • 06 - Spoofing IRDP.mp4
    02:02
  • 01 - Investigating DHCP.mp4
    04:52
  • 02 - Depleting the DHCP pool.mp4
    04:02
  • 03 - Deploying a rogue DHCP server.mp4
    04:02
  • 04 - Defending against DHCP attacks.mp4
    02:40
  • 05 - Challenge Identifying key elements in a capture.mp4
    01:19
  • 06 - Solution Identifying key elements in a capture.mp4
    06:00
  • 01 - Describing ARP.mp4
    03:33
  • 02 - Exploring ARP spoofing tools.mp4
    03:30
  • 03 - Detecting ARP spoofing.mp4
    03:43
  • 04 - Defending against ARP attacks.mp4
    03:08
  • 01 - Summarizing DNS.mp4
    05:26
  • 02 - Caching and forgery.mp4
    05:22
  • 03 - Poisoning DNS.mp4
    03:08
  • 04 - Guarding against DNS attacks.mp4
    03:08
  • 05 - Challenge Investigate a DNS header.mp4
    01:12
  • 06 - Solution Investigate a DNS header.mp4
    02:17
  • 01 - Capturing images.mp4
    03:23
  • 02 - Examining HTTP headers and URLs.mp4
    04:47
  • 03 - Scooping data with TShark.mp4
    02:01
  • 04 - Sniffing tools for mobile devices.mp4
    02:38
  • 05 - Investigating Omnipeek.mp4
    04:10
  • 06 - Guarding against sniffing.mp4
    03:45
  • 01 - Next steps.mp4
    00:55
  • Description


    Ethical hacking involves testing to see if an organization's network is vulnerable to outside attacks. It's one of the most desired stills for any IT security professional. In this course—which maps to the Certified Ethical Hacker v12 certification—Lisa Bock provides an overview of what a sniffer is, and how hackers use it to intercept network traffic. Lisa gives a demonstration of what a MAC attack is, and how ethical hackers can prevent them. She then dives into DHCP, ARP, and DNS, and how hackers can penetrate a network from these services, before showing ethical hackers how to countermeasure such attacks. Lisa concludes the course with an overview of the various sniffing tools and techniques used today by hackers, with discussion of how ethical hackers can protect their network.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Experienced author with a demonstrated history of working in the e-learning industry. She is a security ambassador with a broad range of IT skills and knowledge, including networking, CyberOps, Wireshark, biometrics, Ethical Hacking and the IoT. Lisa is an author for LinkedIn Learning, Packt Publishing and CompTIA and is an award-winning speaker who has presented at several national conferences. She holds a MS in computer information systems/information assurance from UMGC. Lisa was an associate professor in the IT department at Pennsylvania College of Technology (Williamsport, PA) from 2003 until her retirement in 2020. She is involved with various volunteer activities, and she and her husband Mike enjoy bike riding, watching movies, and traveling.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 38
    • duration 2:08:39
    • English subtitles has
    • Release Date 2023/07/02

    Courses related to Ethical Hacking