Ethical Hacking: Sniffing
Offered By: Pluralsight
Course Description
Overview
Sniffing is a skill that attackers use to monitor and capture data that is passing through a network. This course will teach you the skills required to successfully gather data from a target as well as the information needed for the CEH 312-50 exam.
Once an attacker makes their way into your infrastructure the first thing they do is begin looking around for what data is being transmitted. In this course, Ethical Hacking: Sniffing, you’ll learn the skills needed to perform various sniffing attacks on any given network. First, you’ll explore the overall concepts of what sniffing is designed to do. Next, you’ll discover various spoofing and sniffing techniques to compromise switches and other network devices. Finally, you’ll learn how to detect sniffing attacks and how to protect your organization from these types of attacks. When you’re finished with this course, you’ll have the skills and knowledge of sniffing attacks needed for the CEH 312-50 exam.
Once an attacker makes their way into your infrastructure the first thing they do is begin looking around for what data is being transmitted. In this course, Ethical Hacking: Sniffing, you’ll learn the skills needed to perform various sniffing attacks on any given network. First, you’ll explore the overall concepts of what sniffing is designed to do. Next, you’ll discover various spoofing and sniffing techniques to compromise switches and other network devices. Finally, you’ll learn how to detect sniffing attacks and how to protect your organization from these types of attacks. When you’re finished with this course, you’ll have the skills and knowledge of sniffing attacks needed for the CEH 312-50 exam.
Syllabus
- Course Overview 2mins
- Examining Sniffing Concepts 44mins
- Utilizing MAC Attacks 22mins
- Exposing DHCP Attacks 30mins
- Understanding ARP Poisoning Attacks 29mins
- Executing Spoofing Attacks 21mins
- Playing with DNS Poisoning Attacks 21mins
- Implementing Countermeasures 15mins
- Domain Summary 2mins
Taught by
Dale Meredith
Related Courses
Improve Your Threat Modeling SkillsLinkedIn Learning Threat Modeling: Spoofing In Depth
LinkedIn Learning Threat Modeling Security Fundamentals
Microsoft via Microsoft Learn Masterclass - Hacking de dispositivos moviles
Udemy