Setup Menus in Admin Panel

  • LOGIN
  • No products in the cart.

Course Name: Cyber Security Course Network Fundamentals & Layer Attacks (Sub ENG)

Descriptions

Course Curriculum

Section 1: Network Fundamentals
Introduction and What the Course 00:00:00
Section 2: Reference Models
What is “Protocol” 00:00:00
Reference Models 00:00:00
OSI Reference Model 00:00:00
OSI vs TCP/IP 00:00:00
Demonstration using Wireshark 00:00:00
Section 3: Data Link Layer ( Layer 2 )
Standards & Protocols 00:00:00
Ethernet Principles, Frame & Headers 00:00:00
ARP ( Address Resolution Protocol ) Mechanism, ARP Tables, ARP Packets 00:00:00
ARP Hand-On Practices 00:00:00
VLANs – Virtual Local Area Networks 00:00:00
WLANs – Wireless Local Area Networks 00:00:00
Section 4: Network Layer ( Layer 3 )
Introduction to Network Layer 00:00:00
Internet Protocol – IP 00:00:00
IPv4 Adressing System 00:00:00
IPv4 Packet Header 00:00:00
IPv4 Subnetting Classful Networks 00:00:00
IPv4 Subnetting Subnet Mask 00:00:00
IPv4 Subnetting Understanding 00:00:00
IPv4 Shortage 00:00:00
Private Networks 00:00:00
Private Networks – Demonstration 00:00:00
NAT – Network Address Translation 00:00:00
IPv6, Packet Header & Addressing 00:00:00
DHCP – How the Mechanism Works 00:00:00
ICMP – Internet Control Message Protocol 00:00:00
Traceroute 00:00:00
Section 5: Transport Layer ( Layer 4 )
Introduction to Transport Layer 00:00:00
TCP – Transmission Control Protocol 00:00:00
TCP Header 00:00:00
UDP – User Datagram Protocol 00:00:00
Section 6: Application Layer (Layer 5-7)
Introduction to Application Layer 00:00:00
DNS – Domain Name System 00:00:00
HTTP ( Hyper Text Transfer Protocol ) 00:00:00
HTTPS 00:00:00
Checklist – What We Have Learned 00:00:00
Section 7: Network & Data Link Layer (Layer 2) Attacks
What is Covered 00:00:00
Section 8: Setting Up the Laboratory
Laboratory and Virtual Platforms 00:00:00
Kali From VMWare Image-Step1 00:00:00
Kali From VMWare Image-Step2 00:00:00
Kali From VMWare Image-Step3 00:00:00
Kali From ISO-Step1 00:00:00
Kali From ISO-Step2 00:00:00
Kali From ISO-Step3 00:00:00
Download & Install OWASP BWA FREE 00:00:00
Section 9: Using GNS3 and Creating a GNS3 Networks
Download & Install 00:00:00
Setting Up the First Project 00:00:00
GNS3 Environment 00:00:00
Building GNS3 Network 00:00:00
Attach Kali (or another VM) to the GNS3 Network 00:00:00
Configuring Switch & Router (Cisco) and creating VLANs 00:00:00
Section 10: Network Sniffing The “Man in the Middle” (MITM)
MITM Listening to the traffic 00:00:00
Sniffing 00:00:00
TCP Dump 00:00:00
Wireshark Capturing the Traffic 00:00:00
Wireshark Following Stream 00:00:00
Wireshark Summarise Network 00:00:00
Section 11: Active Network Devices
Router, Switch, Hub 00:00:00
Section 12: Expanding Sniffing Space
How to Expand Sniffing Space 00:00:00
MAC Flood Switching 00:00:00
MAC Flood Using Macof Tool 00:00:00
MacFlood – Countermeasures 00:00:00
ARP Spoof 00:00:00
ARP Cache Poisoning using Ettercap 00:00:00
DHCP Starvation & DHCP Spoofing 00:00:00
DHCP Mechanism 00:00:00
DHCP Starvation – Scenario 00:00:00
DHCP Starvation Demonstration with Yersina 00:00:00
VLAN Hopping 00:00:00
VLAN Hopping Switch Spoofing 00:00:00
VLAN Hopping Double Tagging 00:00:00
Section 13: Penetration Testing of Network Devices
Reconnaissance Finding Open Ports & Services Using NMAP 00:00:00
Password Cracking 00:00:00
Online SSH Password Cracking Using Hydra 00:00:00
Compromising SNMP What is SNMP 00:00:00
Compromising SNMP Finding Community Names Using NMAP Scripts 00:00:00
Compromising SNMP Write Access Check Using SNMP-Check Tool 00:00:00
Compromising SNMP Grabbing SNMP Configuration Using Metasploit 00:00:00
Weaknesses of network devices 00:00:00
Section 14: Auditing Network Devices
Password Creation Methods of Cisco Routers 00:00:00
Identity Management 00:00:00
ACL – Access Control Lists 00:00:00
SNMP Security 00:00:00
Online Learning Thailand.
X