Companies Home Search Profile

Networking for Ethical Hacking

Focused View

Toronto Tech

5:01:33

64 View
  • 1. Introduction.mp4
    05:23
  • 1. Introduction to Number System.mp4
    08:35
  • 2. Convert Decimal to Binary.mp4
    03:29
  • 3. Convert Binary to Decimal.mp4
    03:32
  • 4. Convert Binary To Hexadecimal.mp4
    06:33
  • 1. What is Computer Network.mp4
    05:23
  • 2. Major Components of Computer Network.mp4
    07:44
  • 3. Reference Model 1.mp4
    10:45
  • 4. Reference Model 2.mp4
    03:06
  • 1. Application Layer and Port Number.mp4
    04:15
  • 2. Master Http.mp4
    13:26
  • 3. Master FTP.mp4
    04:34
  • 4. Master SMTP.mp4
    04:59
  • 5. Master DNS.mp4
    09:27
  • 1. Master TCP and UDP.mp4
    11:26
  • 1. Introduction to IP.mp4
    13:21
  • 2. Introduction to Router.mp4
    06:39
  • 3. Introduction to NAT.mp4
    04:31
  • 4. Subnetting.mp4
    08:29
  • 5. ICMP.mp4
    05:57
  • 6. DHCP.mp4
    02:47
  • 1. MAC address.mp4
    05:10
  • 2. Introduction to Switch.mp4
    06:15
  • 3. Master ARP.mp4
    04:05
  • 1. Lab Overview.mp4
    03:56
  • 2. Download and Install VMware.mp4
    05:54
  • 3. Download and Install VirtualBox.mp4
    03:19
  • 4. Download and Install Kali Linux.mp4
    09:04
  • 5. Download and Install Metasploitable2.mp4
    06:07
  • 6. Download and Install Windows 11 VM.mp4
    03:26
  • 7. Download and Install Windows 11 VM part 2.mp4
    04:23
  • 8. Test our lab.mp4
    08:09
  • 1. ipconfig.mp4
    02:57
  • 2. ipconfig release and renew.mp4
    02:44
  • 3. ipconfig displaydns &flushdns.mp4
    01:52
  • 4. netstat.mp4
    02:01
  • 5. netstat-ano.mp4
    01:53
  • 6. nbtstat command.mp4
    03:04
  • 7. ARP command.mp4
    02:14
  • 8. getmac.mp4
    01:11
  • 9. hostname &systeminfo.mp4
    01:58
  • 10. route command.mp4
    01:15
  • 11. ping command.mp4
    03:25
  • 12. tracert.mp4
    01:54
  • 13. pathping.mp4
    01:25
  • 14. nslookup.mp4
    02:20
  • 15. tasklist.mp4
    01:34
  • 16. netsh wlan show profile.mp4
    01:29
  • 17. show firewall Configuration.mp4
    01:27
  • 1. arp.mp4
    02:17
  • 2. dig.mp4
    01:17
  • 3. ifconfig.mp4
    02:48
  • 4. ip.mp4
    02:00
  • 5. nc.mp4
    01:47
  • 6. netstat.mp4
    02:29
  • 7. nslookup.mp4
    01:14
  • 8. ping.mp4
    01:26
  • 9. route.mp4
    01:22
  • 10. ping.mp4
    01:26
  • 11. ss.mp4
    03:00
  • 12. traceroute.mp4
    01:53
  • 13. ss command.mp4
    03:00
  • 1. Introduction to Wireshark.mp4
    05:49
  • 2. Application Layer Protocols in Wireshark.mp4
    11:23
  • 3. Transport Layer Protocols in Wireshark.mp4
    05:29
  • 4. Network Layer Protocols in Wireshark.mp4
    07:54
  • 5. Datalink Layer Protocols in Wireshark.mp4
    06:07
  • Description


    Neworking for Begginers in Cybersecurity

    What You'll Learn?


    • Master Networking Fundmentals
    • Master Aplication Layer Protcols (Http, smtp,ftp and DNS)
    • Master Transport Layer Protocol (TCP and UDP)
    • Master Routing techniques and IP addressing
    • Master switching ARP and mac address

    Who is this for?


  • Anyone wants to start ethical hacking must know can take this course as first step
  • More details


    Description

    This course is designed to provide students with a comprehensive understanding of the networking fundamentals necessary for ethical hacking. Students will gain an in-depth knowledge of networking protocols, application layer protocols, transport layer protocols, networking layer data link layer, Windows networking commands, Linux networking commands, and networking protocols in Wireshark.

    Module 1: Networking Fundamentals In this module, students will learn the basics of networking. They will study concepts such as IP addressing, subnetting, network topologies, OSI model, TCP/IP model, and more. Students will also learn about networking hardware such as routers, switches, and firewalls.

    Module 2: Application Layer Protocols This module focuses on application layer protocols, including HTTP, FTP, DNS, SMTP, and more. Students will learn how these protocols work and how to use them for ethical hacking purposes.

    Module 3: Transport Layer Protocols In this module, students will learn about transport layer protocols, including TCP and UDP. Students will understand the differences between these protocols and learn how to use them for ethical hacking.

    Module 4: Networking Layer Data Link Layer This module focuses on the networking layer and data link layer. Students will study networking devices such as hubs, bridges, and switches. They will also learn about MAC addresses, ARP, and VLANs.

    Module 5: Windows Networking Commands This module is dedicated to Windows networking commands. Students will learn how to use command prompt commands such as ipconfig, netstat, ping, and more for ethical hacking purposes.

    Module 6: Linux Networking Commands In this module, students will learn about Linux networking commands such as ifconfig, ping, netstat, and more. Students will learn how to use these commands for ethical hacking purposes.

    Module 7: Networking Protocols in Wireshark In this final module, students will learn how to use Wireshark to analyze network traffic. Students will learn how to capture and filter traffic, read and interpret packets, and identify network vulnerabilities.

    At the end of this course, students will be equipped with a strong understanding of networking fundamentals and how to apply them for ethical hacking purposes. They will have practical experience with Windows and Linux networking commands and be able to use Wireshark to identify vulnerabilities in a network.

    Who this course is for:

    • Anyone wants to start ethical hacking must know can take this course as first step

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Toronto Tech
    Toronto Tech
    Instructor's Courses
    a programming instructor with over 10 years of experience in the field. He holds a Bachelor's degree in Computer Science from the University of California, Berkeley, and a Master's degree in Software Engineering from the Massachusetts Institute of Technology.After completing his studies,  worked as a software developer for several years before transitioning to teaching. He started out as a TA in his alma mater, helping undergraduate students with their programming assignments, and eventually moved on to teaching full-time at a community college.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 67
    • duration 5:01:33
    • Release Date 2023/05/17