Hacking Academy: How to Monitor & Intercept Transmitted Data
- Basic IT knowledge
- No programming skills needed
LAST UPDATED: 07/2020
Hacking Academy: Monitoring Transmitted Data
We are introducing one of the most interesting modules from our Hacking in Practice: Certified Ethical Hacking MEGA Course available on Udemy.
During 1.5 hours of training you will learn how to intercept data in your network. You'll get to know one of the most powerful and versatile ethical hacking tools - Wireshark. You'll be shocked how much there is to read and monitor...
Before you begin: the practical use of the course you are going to see has been proven by thousands of people all over the world. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we’d like to share with you.
IT Security Academy (ISA) is a company that associates ITsec Professionals. Now we are proud to share our knowledge online. Certified experts (CISS, MCSE:MS, CEH, CISSP) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for certification exams, but also teach you pratical skills. You’re welcome to join us and start your training anytime.
If you're serious about learning ethical hacking and IT sec in general, here's what's waiting for you inside our Complete Certified Ethical Hacking Course - ISA CISS:
+ 16 main course sections (from hacking history, designing secure networks to disaster recovery and application security)
+ 240 independent training modules for your convenience
+ 714 pages of PDF notes that will help you prepare to the ISA CISS examination
+ 27 hours of videos and other educational content
+ 1 examination voucher you will get after having completed the course
+ over 17.000 students already enrolled
+ over 130 five star ratings
- Hacking enthusiasts
- IT security beginners and professionals
- Everyone interested in IT sec and ethical hacking
- Welcome to the course00:05
- Introduction to Monitoring Transmitted Data01:06
- Monitoring Transmitted Data - Basic informations08:03
- Intrusion detection systems07:43
- Why are firewalls and NDIS not enough?05:41
- Wireshark - Introduction to network analysis06:29
- How to use Wireshark?08:27
- Analyzing Captured data05:43
- How to analyze telnet protocol?08:09
- Intrusion detection07:48
- Scanning computers07:47
- Monitoring Transmitted Data - Notes28 pages
- Quiz1 question
- New lecture on Shellcode Writing00:08
- Writing a Shellcode17:35
- See how the IT Security Academy certificate looks like1 page
- BONUS LECTURE: Join the course and become CISS00:40
- Thank you for joining the training00:05
IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.
The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.
We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.