Hacking Academy: How to Monitor & Intercept Transmitted Data

Learn how to intercept data in your network. Monitor transmitted data and detect intrusion. Free hacking lesson.
Rating: 4.0 out of 5 (2,801 ratings)
112,059 students
Hacking Academy: How to Monitor & Intercept Transmitted Data
Rating: 4.0 out of 5 (2,801 ratings)
112,059 students
Learn how to intercept data in networks
Monitor transmitted data
Detect intrusions
See what is going on in your network
Learn how to read and filter data in Wireshark

Requirements

  • Basic IT knowledge
  • No programming skills needed
Description

LAST UPDATED: 02/2020

Hacking Academy: Monitoring Transmitted Data

We are introducing one of the most interesting modules from our Hacking in Practice: Certified Ethical Hacking MEGA Course available on Udemy.

During 1.5 hours of training you will learn how to intercept data in your network. You'll get to know one of the most powerful and versatile ethical hacking tools - Wireshark. You'll be shocked how much there is to read and monitor...

Before you begin: the practical use of the course you are going to see has been proven by  thousands of people all over the world. People who make their first  steps in computer / network security and professionals: network  administrators, programmers, pentesters, black- and white hat hackers.  Please, read carefully what we’d like to share with you.

IT Security Academy (ISA) is a company that associates ITsec Professionals. Now we are proud to share our knowledge online. Certified  experts (CISS, MCSE:MS, CEH, CISSP) have created courses from Beginner  to Advanced level. Our goal is to provide the highest quality materials  you’ve ever seen online and prepare you not only for certification  exams, but also teach you pratical skills. You’re welcome to join us and  start your training anytime.

Want more?

If you're serious about learning ethical hacking and IT sec in general, here's what's waiting for you inside our Complete Certified Ethical Hacking Course - ISA CISS:

+ 16 main course sections (from hacking history, designing secure networks to disaster recovery and application security)
+ 240 independent training modules for your convenience
+ 714 pages of PDF notes that will help you prepare to the ISA CISS examination
+ 27 hours of videos and other educational content
+ 1 examination voucher you will get after having completed the course
+ over 17.000 students already enrolled
+ over 130 five star ratings


Who this course is for:
  • Hacking enthusiasts
  • IT security beginners and professionals
  • Everyone interested in IT sec and ethical hacking
Curriculum
4 sections • 17 lectures • 1h 54m total length
  • Welcome to the course
  • Introduction to Monitoring Transmitted Data
  • Monitoring Transmitted Data - Basic informations
  • Intrusion detection systems
  • Why are firewalls and NDIS not enough?
  • Wireshark - Introduction to network analysis
  • How to use Wireshark?
  • Analyzing Captured data
  • How to analyze telnet protocol?
  • Intrusion detection
  • Scanning computers
  • Monitoring Transmitted Data - Notes
  • Quiz
  • New lecture on Shellcode Writing
  • Writing a Shellcode
  • See how the IT Security Academy certificate looks like
  • BONUS LECTURE: Join the course and become CISS
  • Thank you for joining the training

Instructors
IT Security Certified Professional
IT Security Academy
  • 3.9 Instructor Rating
  • 8,434 Reviews
  • 156,584 Students
  • 17 Courses

IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.

IT Security Experts - We turn beginners into professionals.
Hacking School
  • 3.9 Instructor Rating
  • 8,434 Reviews
  • 156,584 Students
  • 17 Courses

The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.

We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.