Hacking Academy: How to Monitor & Intercept Transmitted Data

Learn how to intercept data in your network. Monitor transmitted data and detect intrusion. Free hacking lesson.
4.1 (581 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
37,554 students enrolled
Free
Start Learning Now
  • Lectures 12
  • Contents Video: 1 hour
    Other: 29 mins
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 3/2014 English

Course Description

Hacking Academy: Monitoring Transmitted Data
LAST COURSE UPDATE: August, 2016

We are introducing one of the most interesting modules from our Complete Certified Ethical Hacking Training 3.0 - ISA CISS Certification 2016 available on Udemy.

During over 1.5 hours of training you will learn how to intercept data in your network. You'll get to know one of the most powerful and versatile ethical hacking tools - Wireshark. You'll be shocked how much there is to read and monitor...

Before you begin: the practical use of the course you are going to see has been proven by thousands of people all over the world. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we’d like to share with you.

IT Security Academy (ISA) is a company that associates ITsec Professionals. Now we are proud to share our knowledge online. Certified experts (CISS, MCSE:MS, CEH, CISSP) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for certification exams, but also teach you pratical skills. You’re welcome to join us and start your training anytime.

Want more?

If you're serious about learning ethical hacking and IT sec in general, here's what's waiting for you inside our Complete Certified Ethical Hacking Course 3.0 - ISA CISS (2016):

+ 16 main course sections (from hacking history, designing secure networks to disaster recovery and application security)
+ 237 independent training modules for your convenience
+ 714 pages of PDF notes that will help you prepare to the ISA CISS examination
+ 27 hours of videos and other educational content
+ 1 examination voucher you will get for free during this premiere
+ over 13.832 students already enrolled
+ over 127 five star ratings


What are the requirements?

  • Basic IT knowledge
  • No programming skills needed

What am I going to get from this course?

  • Learn how to intercept data in networks
  • Monitor transmitted data
  • Detect intrusions
  • See what is going on in your network
  • Learn how to read and filter data in Wireshark

What is the target audience?

  • Hacking enthusiasts
  • IT security beginners and professionals
  • Everyone interested in IT sec and ethical hacking

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction
01:06

See what you will learn in this module.

Section 2: Monitoring Transmitted Data
Monitoring Transmitted Data - Basic informations
08:03
Intrusion detection systems
07:43
Why are firewalls and NDIS not enough?
05:41
Wireshark - Introduction to network analysis
06:29
How to use Wireshark?
08:27
Analyzing Captured data
05:43
How to analyze telnet protocol?
08:09
Intrusion detection
07:48
Scanning computers
07:47
28 pages

Download and read notes.

Section 3: IT Security Academy - learn more
See how the IT Security Academy certificate looks like
1 page

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

IT Security Academy, IT Security Certified Professional

IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.

Instructor Biography

Hacking School, IT Security Experts - We turn beginners into professionals.

The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.

We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.

Ready to start learning?
Start Learning Now