Hi and welcome to our Network hacking and security course.
In this course, we will teach you how wired and wireless network attacks are performed in a simulated/test environment in an ethical way. This course helps the network security professional to mitigate these attack using the recommended solution at the end of each module.
You will be encouraged to practice what you have learned in a simulated environment via our practice "Audio Visual Exercise" session.
We have designed this course to enable those aspiring to enter the information security field to learn core concepts on network hacking in order to safeguard a network infrastructure. By the end of this course you will be familiar with how various types of wired and wireless network hacks are performed and you will be fully equipped to test and safegaurd a network infrastructure against various real time attack vectors.
This course has been specifically designed by a team of information security researchers who are acknowledged experts in their field.
This course has been designed to accelerate your learning process through the use of creative animations and easy to understand voice over narratives. Complex hacking concepts have been broken down into easy to understand modules.
Together, our team will walk you through the entire learning process step by step.
This course is perfect for existing network architects, network administrators, network security professionals as well as anybody who is passionate about developing their skills in the field of internet security. No prior training is required to take this course as we will start with the basics. We welcome anyone with a thirst for learning.
We look forward to having you join us. In the meantime, please feel free to take a look at our demo tutorial and exercise before you purchase the full course.
The purpose of this course is to provide you with an insight into how network attacks are made and to teach you the skills you need in order to defend against these attacks.
This section will cover how networks operate and explain how communication happens in a network.
This is going to be a MCQ based on this lecture.
The Physical Layer is the basis for any network and around 90% of the problems in a network arise at this layer. This section will explain how Physical Layer attacks are performed.
This module will explain which security mechanisms can be used to mitigate attacks that target the Physical Layer in the OSI Model.
The MAC address - Media Access Control - is the unique physical address on a system’s NIC. Masking this address is called MAC Spoofing. This section explains how to do this and why it is useful to be able to do this.
This section will deal with MAC Flooding. This is nothing but targeting a Network switch and manipulating its functionality to make it act as a hub by sending it a large number of data packets from different forged MAC addresses.
A step-by-step approach to performing a MAC Flooding Attack.
The Address Resolution Protocol Table is used to maintain a correlation between each MAC address and its corresponding IP address. When this table is poisoned such that all traffic from a system is redirected to that of an attacker it is called ARP Poisoning.
Step by step approach to performing an ARP Poisoning Attack.
This session explains about DNS Spoofing. This is the method of poisoning the victim and redirecting the victim’s requests for a legitimate Domain to a fake.
Practice performing a DNS Spoofing Attack.
DHCP Starvation is the act of flooding the DHCP server with DHCP Discover packets in such a way that the range of available IP addresses at the server is exhausted. This “starves”the legitimate client as there is no available IP Address. This is called a DHCP Starvation Attack.
DHCP – Dynamic Host Configuration Protocol, is a standardized network protocol used to automatically allocate IP addresses on a network from a specified range of IP addresses.
DHCP Starvation attack is the act of flooding the server with DHCP Discover packets in such a way that the range of available IP addresses at the server is exhausted, thus making the legit client starve without an IP Address.
A Rogue DHCP Attack is a sister attack to DHCP Starvation. In this session you will learn how this attack can be carried out.
Performing DHCP starvation allows the attacker to launch his system as the DHCP Server. If the attack is successful, the attacker becomes the DHCP Server and assigns IP addresses to the clients, with his IP as the Gateway.
You will learn various methods with which to mitigate the Attack Vectors discussed in this session.
In this session you will learn how to perform IP spoofing. This is simply the act forging a source IP address with the purpose of concealing the senders true identity.
Step by step approach to performing an IP Spoof Attack.
In this session you will learn how an attacker can sniff traffic between two systems without directly probing the victim. This is called a Passive MITM attack.
In this session you will learn how to use an Active MITM Attack. This attack allows an attacker to sniff traffic between two systems by directly probing the victim.
A step by step approach allowing you to get hands on experience in performing MITM.
ICMP – Internet Control Message Protocol - is a protocol used to test the systems in a network for their availability. In this session you will learn how this protocol can be used to perform a DOS or Flooding Attack.
Step by step approach to performing an ICMP Flooding Attack.
In this session you will be instructed how to perform a SMURF Attack. Similar to an ICMP Flooding Attack, this is a different method of exploiting the ICMP protocol.
A step by step approach to performing a SMURF Attack.
This session deals with an archived attack known as Ping of Death. When a packet which is larger than that of the maximum size allowed is sent to a target computer, it results in a system crash called Ping of Death.
You will learn methods for implementing Network Layer Security methods in order to mitigate the attacks pertaining to this layer of the OSI model.
This session gives an insight into how the Transport Layer works and the protocols that form the basis of the Transport Layer.
This session deals with exploiting the TCP Protocol in order to flood the victim.
Step by step approach to performing a TCP Flooding Attack.
This session deals with exploiting the UDP Protocol in order to flood the victim.
Step by step approach to performing a UDP Flooding Attack.
Mitigation methods to achieve Transport Layer Security.
This session briefly explains the basics that one must know about a Wireless Network.
An introduction to the various Wireless Network Attacks.
This is the first layer in the OSI model and the attacks pertaining to this layer can be performed upon gaining a direct access to the network. This session gives an insight on how attacks pertaining to this layer can be performed.
In this session you will learn mitigation techniques that will enable you to enhance Physical Layer Security in a wireless network.
This session will show how a search for the wifi enabled networks, called War Driving, can be performed.
Let's begin with a step by step approach to proving that employing "Hidden Hotspot" is a MYTH.
This is a pre-requisite that one needs to carry out while performing any kind of a wireless attack.
Here is a step by step approach to prove that "Hiding Hotspot" from broadcasting itself to be a MYTH.
This session gives you an insight into how WEP works.
The method of meddling with an ongoing connection, by injecting new packets which pretend that they are a part of the normal communication, is known as packet injection or packet forging. This session deals with using this method to crack the WEP Password.
A step by step approach to cracking the WEP Key using the Packet Injection method.
By grabbing a gratuitous ARP packet sent by any one of the clients, the attacker manipulates it to form an ARP request and sets up a fake AP, thus collecting packets from clients in a large number. This session explains how to crack the WEP Key using the grabbed packets.
A step by step approach to performing a Caffe Latte Attack.
This attack, unlike Caffe Latte, captures any IP or ARP packet to generate an ARP request and make the clients connected to the AP send large number of data packets, which the attacker captures. This session explains how to crack the WEP Key with these packets.
A step by step approach to performing a Hirte Attack.
Another variant for cracking the WEP Key is called Korek's Chopchop Attack. This session explains how to crack the WEP key using this method.
In this session you will practice performing a Korek's Chopchop Attack.
I head the academia and industry relations in infySEC. I am also the director at infySEC .Early from the late 90's, I have been always passionate about computer, espically games which eventually had got interest to learn how computers work, such as application , debugging, disassembling, compiling,etc., with time, the same interest got towards networking, like how packets communicate, how data gets transferred,bandwidth , then got lil into wireless and eventually turning back prooved me i was not anywhere but a lovely apt domain called 'Security', i feel i have been travelling in a very interesting path from where i have started, i would certainly urge everyone of us to try it experience it, its not jus the knowledge but its fun, and yea for me i have miles to go myself.
After 14 years I have turned to focus my efforts on training how attackers hack systems and also started to help them understand how to secure ourselves against such attacks. I decided to teach all that i have learnt over the period of 15 years in form of few videos, which effectively means i teach all that 15 years to you in a week... My instruction is very actionable with live demos and hands on, Also i share lab exercises which will enable you not just to read but impliment what you have learnt, I want students to take the knowledge they gain and start using it to make money or do what they choose to do with it (ofcourse only ethical ones).
In 2013, I along with my team at infySEC, stuck the World Record for conducting the largest and longest ethical hacking Marathon with over 9000+ participants assembled in one location, check us on youtube for reference.
My expectations soon after my graduation about IT company's were shattered :D , afterall they say, you are what your company is.My fellow colleagues and team mates were working for money, i was desperate and searching for some like minded in computers, but again, its been 5 yrs i have been working for Multi national companies, and now i have got full time freelancing, afterall there is no one to question your time restriction of work, domain of work, etc..,You are master of your fate, and captain of your soul.... Live the life you have imagined :D
You will find my teaching style is well liked by my students and they are always looking for new and exciting courses from me.
Harry The Boss - Rating: 5 out of 5
I highly recommend infysec to everyone.I joined the training with absolutely no prior experience in ethical hacking....When I attended a training..It was revelation..The fluidity and crisp and clear understanding of trainer was showing...No jargons. In fact he made a very complex phenomenon very simple to comprehend. I gained much more than expectations.... The trainer was master in his subject knowledge...With answers to any questions shooting at him....
Stacie Stalcup - Rating: 5 out of 5
I enjoy the animation. No matter what computer course Infysec offers, I will most likely take it because of how the subject matter is taught and presented. We aren't forced to look at someone reading powerpoints or watching someone talking into the camera which makes me sleepy and becomes boring. There is no dull PowerPoint here; Instead, InfySEC animates the techniques and after the lessons provide step by step exercises. I wish all Udemy classes were taught this way.
Dominik Koszkul - Rating: 5 out of 5
This course quickly shows what are dangers in web. Great for beginners to realize how to write the web applications and secure the servers against attackers
Raymundo Torres - Rating: 5 out of 5
This instruction video was great. Just stuck to the material and explained it thoroughly with visual images and examples. This video inspired me to start a smalll training program for my fellow colleagues. Thanks!
Diana Carolina Gómez - Rating: 5 out of 5
Because the explanations have simple examples and close to reality. This helps to recognize and understand the content of the course easier.
Miteshkumar Joshi - Rating: 5 out of 5
Having some knowledge on HTTP, this course is suitable for me and clearly defines some areas where I was findling it diffculty.
Come , lets togather make the world a secure place to live in !