Network Security Attacks
4.5 (226 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
13,441 students enrolled

Network Security Attacks

Network security attacks
4.5 (226 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
13,441 students enrolled
Created by Muhammad Bilal
Last updated 1/2020
English [Auto]
Current price: $13.99 Original price: $19.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 1.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Become a Network attacks and vulnerability resolver. After this course, you will be able to discover security vulnerabilities across an entire network, by using network techniques and vulnerability scanning. You will be able to architect your network for maximum security and prevent local and remote attacks. We also cover the use of TCP /IP packets and view how to protect them. what are the issues and drawbacks of each packet and Protocols that are used in the past. How you prevent them and protect your precious data and this course will provide you with better network security services. You will understand the various types of attacks on TCP/IP and over the Network layers protocols and what threats each help mitigate.
  • Strong understanding the basic concepts of Information of Internet Network Security. How the OSI layers and TCP suits are different from each other. The flow packets and datagrams must be known... you must have atleast interest in this course only than you can pass.

This course will tell you about different types of attacks that are happened over the internet... how someone exploit others profiles and their private data... its will teach you about spoofing,sniffing and many other types of attacks. encapsulation of data, header files and their details. from intermediate to advance level.. so this course is for intermediate and advance levels people.

Who this course is for:
  • This course is for anyone who wants to become an expert in security, privacy, and anonymity. This volume covers network security attacking and defending. Online tracking and browser security. For anyone who would love to gain a practical skillset in mitigating the risk from, malware, Trojans, hackers, trackers, cyber criminals and all online threats. This course is for anyone who wants to keep their precious files, emails, accounts and personal information out of the hands of the bad guys. For beginners and intermediate Internet users who are interested in security, safety, and privacy. For those who want privacy and anonymity online from hackers, corporations and governments. This course is designed for personal and home Internet security, privacy, and anonymity. Most of the topics apply in the same way to a business, but the course is delivered as if to an individual for personal cybers security, privacy, and anonymity.
Course content
Expand all 24 lectures 01:40:14
+ Introduction
4 lectures 14:28
Tcp/ip protocol stack

This quiz is the basic practise that will tell you how much you learn so far.

TCP/IP Stack with example and encapsulation
5 questions
+ Headers
3 lectures 25:55
IPv4 header
TCP header

Network header is one of the most important concept... you must give test and explore more about that....

Test your skills about header
6 questions
+ Network attacks
2 lectures 16:14
Packet Sniffing
Session hijacking, Man in the middle attacks, Dos vs DDOS attack..
3 lectures 09:37
arp packet format
working of arp
arp spoofing
+ ICMP attacks
2 lectures 04:02
ICMP Smurf attack
Ping of Death
+ TCP attack
2 lectures 11:14

TCP identifies two types of OPEN calls:

Active Open. In an Active Open call a device (client process) using TCP takes the active role and initiates the connection by sending a TCP SYN message to start the connection.

Passive Open A passive OPEN can specify that the device (server process) is waiting for an active OPEN from a specific client. It does not generate any TCP message segment. The server processes listening for the clients are in Passive Open mode.

Three-way Handshake

Step 1. Device A (Client) sends a TCP segment with SYN = 1, ACK = 0, ISN (Initial Sequence Number) = 2000.

The Active Open device (Device A) sends a segment with the SYN flag set to 1, ACK flag set to 0 and an Initial Sequence Number 2000 (For Example), which marks the beginning of the sequence numbers for data that device A will transmit. SYN is short for SYNchronize. SYN flag announces an attempt to open a connection. The first byte transmitted to Device B will have the sequence number ISN+1.

Step 2. Device B (Server) receives Device A’s TCP segment and returns a TCP segment with SYN = 1, ACK = 1, ISN = 5000 (Device B’s Initial Sequence Number), Acknowledgment Number = 2001 (2000 + 1, the next sequence number Device B expecting from Device A).

Step 3. Device A sends a TCP segment to Device B that acknowledges receipt of Device B’s ISN, With flags set as SYN = 0, ACK = 1, Sequence number = 2001, Acknowledgment number = 5001 (5000 + 1, the next sequence number Device A expecting from Device B)

TCP connection establishment
TCP sync Flood Attack
+ Name Resolution
2 lectures 06:42

The DNS resolver will almost invariably have a cache (see above) containing recent lookups. If the cache can provide the answer to the request, the resolver will return the value in the cache to the program that made the request. If the cache does not contain the answer, the resolver will send the request to one or more designated DNS servers. In the case of most home users, the Internet service provider to which the machine connects will usually supply this DNS server: such a user will either have configured that server's address manually or allowed DHCP to set it; however, where systems administrators have configured systems to use their own DNS servers, their DNS resolvers point to separately maintained name servers of the organization. In any event, the name server thus queried will follow the process outlined above, until it either successfully finds a result or does not. It then returns its results to the DNS resolver; assuming it has found a result, the resolver duly caches that result for future use, and hands the result back to the software which initiated the request.

Local Name Resolution
+ Furture work
2 lectures 03:46
Furture work

This channel will help you to grow further...

Bonus lecture