Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Advanced Network Security
Module 1: Introduction to Network Security
M.1.1 Introduction to Network Security and Types of Attacks (9:13)
M.1.1.A Types of attack (Lab) (3:24)
M.1.1.B Types of attack (Lab) (1:40)
M.1.1.C Types of attack (Lab) (2:36)
M.1.1.D Types of attack (Lab) (1:35)
M.1.2 Types of Attack DoS DNS Amplification (1:31)
M.1.2.A Types of Attack DoS DNS Amplification (Lab) (3:32)
M.1.3 Types of Attack Buffer Overflow Fragmentation Attack and MiTM (9:32)
M.1.3.A MiTM (Lab) (5:26)
M.1 Introduction to Network Security (PDF)
Module 2: Nmap Basics
M.2.1 Wireshark (1:30)
M.2.1.A Wireshark (Lab) (4:00)
M.2.2 Network Mapping Port Scan Fundamentals (7:36)
M.2.2.A Network Mapping Port Scan Fundamentals (Lab) (1:43)
M.2.3 Network Mapping SYN Scan (1:17)
M.2.3.A Network Mapping SYN Scan (Lab) (2:57)
M.2.4 Network Mapping FIN PING UDP and Zombie Scan (9:52)
M.2.4.A Network Mapping (Lab) (2:13)
M.2.4.B Network Mapping (Lab) (1:47)
M.2.4.C Network Mapping (Lab) (2:48)
M.2.4.D Network Mapping (Lab) (5:21)
M.2.4.E Network Mapping (Lab) (2:35)
M.2.4.F Network Mapping (Lab) (3:42)
M.2.4.G Network Mapping (Lab) (1:37)
M.2.5. Network Scripting Engine (2:11)
M.2.5.A Network Scripting Engine (Lab) (3:43)
M.2.6 Enumeration using Netcat (2:10)
M.2.6.A Enumeration using Netcat (Lab) (2:48)
M.2 Nmap Basics (PDF)
Module 3: Enumeration
M.3.1.Identifying Vulnerabilities (4:30)
M.3.1.A Identifying Vulnerabilities (Lab) (1:15)
M.3.2 Vulnerability Discovery CVSS (7:08)
M.3.3 Vulnerability Discovery Automated Scanning Nessus (0:48)
M.3.3.A Nessus (Lab) (1:00)
M.3.3.B Nessus (Lab) (2:49)
M.3.4. Common Security Issues (0:47)
M.3 Enumeration (PDF)
Module 4: Exploitation
M.4.1 Introduction to Metasploit Framework (8:19)
M.4.2 Metasploit Framework (0:15)
M.4.2.A Metasploit Framework (Lab) (1:47)
M.4.3 Metasploit Framework-Linux Exploit (0:15)
M.4.3.A Metasploit Framework-Linux Exploit (Lab) (1:55)
M.4.4 Metasploit Framework Msfvenom (1:53)
M.4.4.A Metasploit Framework Msfvenom (Lab) (2:31)
M.4 Exploitation (PDF)
Module 5: Wireless Exploitation
M.5.1 Introduction to Network Security & Terminologies (11:57)
M.5.2 Wi-Fi Frames (5:25)
M.5.3 Wireless Hacking Methodology (2:27)
M.5.4 Authentication Methods and Types of WLAN Attacks (2:52)
M.5.5 WEP (4:40)
M.5.6 WPA/WPA-2 (4:38)
M.5.7 Differences in WEP, WPA and WPA-2 (7:18)
M.5.8 Cafe_latte (1:51)
M.5.9 Bypassing WPA2 using Aircrack-ng (4:29)
M.5.9.A Aircrack-ng Setup (Lab) (1:12)
M.5.9.B WPA2 Bypass Aircrack-ng (Lab) (2:43)
M.5.10 Evil Twin (1:30)
M.5.10.A Evil Twin (Lab) (3:15)
M.5.11 WPA3 and Wi-Fi Guideline (2:01)
M.5.12 Manatoolkit Theory (0:43)
M.5.12.A Manatoolkit Lab (Lab) (1:05)
M.5.1 Wi-Fi Sec (PDF)
M.5 Wireless Exploitation (PDF)
Module 6: Network Auditing
M.6.1 Introduction to Network Auditing (15:45)
M.6.2 Secure Network Design (8:47)
M.6.3 Secure Network Design (1:27)
M.6.4 Network Architecture Review (6:52)
M.6.5 Network Auditing Firewall Auditing (5:29)
M.6.6 Firewall Auditing Methodology (14:46)
M.6.6.A Firewall Auditing Methodology CIS Benchmarks (0:44)
M.6.7 Router Security (4:08)
M.6.8 Access Control List (1:16)
M.6.9 VLAN and VPN (7:00)
M.6.9.A VLAN_and_VPN (1:15)
M.6 Network Auditing (PDF)
Advanced Network Security Quiz
Advanced Network Security Quiz (Easy)
Advanced Network Security Quiz (Medium)
Advanced Network Security Quiz (Difficult)
M.5.7 Differences in WEP, WPA and WPA-2
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock