Hacking Academy Monitoring Transmitted Data

Learn how to intercept data in your network. Monitor transmitted data and detect intrusion. Free hacking lesson.

Last updated 2022-01-10 | 4.6

- Learn how to intercept data in networks
- Monitor transmitted data
- Detect intrusions

What you'll learn

Learn how to intercept data in networks
Monitor transmitted data
Detect intrusions
See what is going on in your network
Learn how to read and filter data in Wireshark

* Requirements

* Basic IT knowledge
* No programming skills needed

Description

LAST UPDATED: 11/2021

Hacking Academy: Monitoring Transmitted Data

We are introducing one of the most interesting modules from our Hacking in Practice: Certified Ethical Hacking MEGA Course available on Udemy.

During 1.5 hours of training you will learn how to intercept data in your network. You'll get to know one of the most powerful and versatile ethical hacking tools - Wireshark. You'll be shocked how much there is to read and monitor...

Before you begin: the practical use of the course you are going to see has been proven by  thousands of people all over the world. People who make their first  steps in computer / network security and professionals: network  administrators, programmers, pentesters, black- and white hat hackers.  Please, read carefully what we’d like to share with you.

IT Security Academy (ISA) is a company that associates ITsec Professionals. Now we are proud to share our knowledge online. Certified  experts (CISS, MCSE:MS, CEH, CISSP) have created courses from Beginner  to Advanced level. Our goal is to provide the highest quality materials  you’ve ever seen online and prepare you not only for certification  exams, but also teach you pratical skills. You’re welcome to join us and  start your training anytime.

Want more?

If you're serious about learning ethical hacking and IT sec in general, here's what's waiting for you inside our Complete Certified Ethical Hacking Course - ISA CISS:

+ 16 main course sections (from hacking history, designing secure networks to disaster recovery and application security)
+ 240 independent training modules for your convenience
+ 714 pages of PDF notes that will help you prepare to the ISA CISS examination
+ 27 hours of videos and other educational content
+ 1 examination voucher you will get after having completed the course
+ over 17.000 students already enrolled
+ over 130 five star ratings


Who this course is for:

  • Hacking enthusiasts
  • IT security beginners and professionals
  • Everyone interested in IT sec and ethical hacking

Course content

4 sections • 18 lectures

Welcome to the course Preview 00:05

Introduction to Monitoring Transmitted Data Preview 01:06

See what you will learn in this module.

Monitoring Transmitted Data - Basic informations Preview 08:03

Intrusion detection systems Preview 07:43

Why are firewalls and NDIS not enough? Preview 05:41

Wireshark - Introduction to network analysis Preview 06:29

How to use Wireshark? Preview 08:27

Analyzing Captured data Preview 05:43

How to analyze telnet protocol? Preview 08:09

Intrusion detection Preview 07:48

Scanning computers Preview 07:47

Monitoring Transmitted Data - Notes Preview 28 pages

Download and read notes.

Quiz

See how the IT Security Academy certificate looks like Preview 1 page

BONUS LECTURE: Join the course and become CISS Preview 00:40

Thanks for joining Preview 00:06