Ethical Hacking: Sniffing
Offered By: Pluralsight
Course Description
Overview
Pluralsight is not an official partner or accredited training center of
EC-Council. You need to keep your network protected from attackers. This course will help you to understand how network sniffing works and how to keep your information secure.
Pluralsight is not an official partner or accredited training center of EC-Council. There's so much an attacker can learn from simply "listening" or sniffing your network. Passwords? Check. Emails? check, and the list goes on and on. This course, Ethical Hacking: Sniffing (part of the Ethical Hacking series) will clarify the central ideas of sniffing and their utilization in hacking exercises. You'll also learn how imperative it is for security professionals to be "up" on sniffers and their methods. Furthermore, you'll be shown a plethora of instruments and procedures utilized as part of securing your network from these types of attacks. By the end of this course, you'll understand much more about sniffing and how to keep your data protected.
Topics:
Pluralsight is not an official partner or accredited training center of EC-Council. There's so much an attacker can learn from simply "listening" or sniffing your network. Passwords? Check. Emails? check, and the list goes on and on. This course, Ethical Hacking: Sniffing (part of the Ethical Hacking series) will clarify the central ideas of sniffing and their utilization in hacking exercises. You'll also learn how imperative it is for security professionals to be "up" on sniffers and their methods. Furthermore, you'll be shown a plethora of instruments and procedures utilized as part of securing your network from these types of attacks. By the end of this course, you'll understand much more about sniffing and how to keep your data protected.
Topics:
- Sniffing – It's Not the Cold Season
- DHCP Assaults
- Big-MAC Attacks
- ARP Poisoning
- DNS Poisoning
- Countermeasures
Taught by
Dale Meredith
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity