Hacking Academy Monitoring Transmitted Data
Tags: Ethical Hacking
Learn how to intercept data in your network. Monitor transmitted data and detect intrusion. Free hacking lesson.
Last updated 2022-01-10 | 4.6
- Learn how to intercept data in networks- Monitor transmitted data
- Detect intrusions
What you'll learn
* Requirements
* Basic IT knowledge* No programming skills needed
Description
LAST UPDATED: 11/2021
Hacking Academy: Monitoring Transmitted Data
We are introducing one of the most interesting modules from our Hacking in Practice: Certified Ethical Hacking MEGA Course available on Udemy.
During 1.5 hours of training you will learn how to intercept data in your network. You'll get to know one of the most powerful and versatile ethical hacking tools - Wireshark. You'll be shocked how much there is to read and monitor...
Before you begin: the practical use of the course you are going to see has been proven by thousands of people all over the world. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we’d like to share with you.
IT Security Academy (ISA) is a company that associates ITsec Professionals. Now we are proud to share our knowledge online. Certified experts (CISS, MCSE:MS, CEH, CISSP) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for certification exams, but also teach you pratical skills. You’re welcome to join us and start your training anytime.
Want more?
If you're serious about learning ethical hacking and IT sec in general, here's what's waiting for you inside our Complete Certified Ethical Hacking Course - ISA CISS:
+ 16 main course sections (from hacking history, designing secure networks to disaster recovery and application security)
+ 240 independent training modules for your convenience
+ 714 pages of PDF notes that will help you prepare to the ISA CISS examination
+ 27 hours of videos and other educational content
+ 1 examination voucher you will get after having completed the course
+ over 17.000 students already enrolled
+ over 130 five star ratings
Who this course is for:
- Hacking enthusiasts
- IT security beginners and professionals
- Everyone interested in IT sec and ethical hacking
Course content
4 sections • 18 lectures
Welcome to the course Preview 00:05
Introduction to Monitoring Transmitted Data Preview 01:06
See what you will learn in this module.
Monitoring Transmitted Data - Basic informations Preview 08:03
Intrusion detection systems Preview 07:43
Why are firewalls and NDIS not enough? Preview 05:41
Wireshark - Introduction to network analysis Preview 06:29
How to use Wireshark? Preview 08:27
Analyzing Captured data Preview 05:43
How to analyze telnet protocol? Preview 08:09
Intrusion detection Preview 07:48
Scanning computers Preview 07:47
Monitoring Transmitted Data - Notes Preview 28 pages
Download and read notes.