Hacking Academy: How to Monitor & Intercept Transmitted Data
- Basic IT knowledge
- No programming skills needed
LAST UPDATED: 02/2020
Hacking Academy: Monitoring Transmitted Data
We are introducing one of the most interesting modules from our Hacking in Practice: Certified Ethical Hacking MEGA Course available on Udemy.
During 1.5 hours of training you will learn how to intercept data in your network. You'll get to know one of the most powerful and versatile ethical hacking tools - Wireshark. You'll be shocked how much there is to read and monitor...
Before you begin: the practical use of the course you are going to see has been proven by thousands of people all over the world. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we’d like to share with you.
IT Security Academy (ISA) is a company that associates ITsec Professionals. Now we are proud to share our knowledge online. Certified experts (CISS, MCSE:MS, CEH, CISSP) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for certification exams, but also teach you pratical skills. You’re welcome to join us and start your training anytime.
If you're serious about learning ethical hacking and IT sec in general, here's what's waiting for you inside our Complete Certified Ethical Hacking Course - ISA CISS:
+ 16 main course sections (from hacking history, designing secure networks to disaster recovery and application security)
+ 240 independent training modules for your convenience
+ 714 pages of PDF notes that will help you prepare to the ISA CISS examination
+ 27 hours of videos and other educational content
+ 1 examination voucher you will get after having completed the course
+ over 17.000 students already enrolled
+ over 130 five star ratings
- Hacking enthusiasts
- IT security beginners and professionals
- Everyone interested in IT sec and ethical hacking
- Welcome to the course
- Introduction to Monitoring Transmitted Data
- Monitoring Transmitted Data - Basic informations
- Intrusion detection systems
- Why are firewalls and NDIS not enough?
- Wireshark - Introduction to network analysis
- How to use Wireshark?
- Analyzing Captured data
- How to analyze telnet protocol?
- Intrusion detection
- Scanning computers
- Monitoring Transmitted Data - Notes
- New lecture on Shellcode Writing
- Writing a Shellcode
- See how the IT Security Academy certificate looks like
- BONUS LECTURE: Join the course and become CISS
- Thank you for joining the training
IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.
The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.
We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.