Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Zero To Mastery

Advanced Ethical Hacking Bootcamp: Network Hacking & Security

via Zero To Mastery

Overview

Take your ethical hacking skills to the next level by learning network hacking techniques, from Man In The Middle and DNS spoofing to router exploits and custom payload creation. Master real-world attack methods, bypass security measures, and gain the skills needed for penetration testing and cybersecurity roles.
  • Launch advanced network attacks like MITM and DNS spoofing
  • Bypass router security using MAC spoofing techniques
  • Exploit vulnerabilities in critical network protocols
  • Execute denial-of-service attacks to test network resilience
  • Manipulate DHCP servers to disrupt network functionality
  • Crack weak cryptographic methods to expose plaintext data
  • Manually craft exploits for network applications from scratch
  • Implement security measures to defend networks against attacks

Syllabus

  •   Introduction
    • Advanced Ethical Hacking Bootcamp: Network Hacking & Security
    • Course Introduction
    • Exercise: Meet Your Classmates and Instructor
    • Structure of the Course
    • Course Resources
    • ZTM Plugin + Understanding Your Video Player
    • Set Your Learning Streak Goal
  •   Introduction to Networking
    • What is Networking?
    • Note: This Section Is Optional!
    • Different Types of Networks
    • LAN vs. WAN
    • Understanding a Simple Network - Part 1
    • Mac Addresses
    • Routers, Switches, Modems
    • Client Server vs. Peer to Peer
    • Understanding a Simple Network - Part 2
    • Star Topology
    • Bus Topology
    • Ring Topology
    • Mesh Topology
    • Hybrid Topology
    • IP Addresses
    • Subnetting
    • Common Networking Commands
    • OSI (Open Systems Interconnection) Model
    • What Is a Protocol?
    • TCP/IP
    • HTTP, HTTPS
    • FTP
    • DNS
    • SSH
    • Other Common Protocols
    • Understanding a Simple Network - Part 3
    • Types Of Network Threats
    • Windows Firewall
    • Understanding a Simple Network - Part 4
  •   Denial of Service Attack
    • DDoS Theory
    • DDoS
  •   Bypassing Routers Whitelist/Blacklist
    • MAC Spoofing Theory
    • Mac Spoofing Access Control Bypass
    • Let's Have Some Fun (+ More Resources)
  •   Man In The Middle Attack (MITM)
    • MITM Theory
    • ArpSpoof Tool
    • Ettercap MITM
    • Unlimited Updates
  •   DNS Attacks
    • DNS Attacks
    • DNS Spoofing
    • DNS Tunnel
  •   Vulnerabilities In Protocols/Components
    • Vulnerabilities in Protocols
    • IPv6 Exploit
    • Course Check-In
  •   DHCP Attacks
    • DHCP Attacks
    • DHCP Starvation
    • Rogue DHCP
    • Implement a New Life System
  •   Router Attacks
    • Router Attacks
    • Router Attacks Practice
  •   Weak Cryptography
    • Weak Cryptography
    • Exploiting Vulnerable Encryption
  •   Manually Exploiting Application Over The Network
    • Manually Exploiting Application Over the Network
    • Writing Exploit - Part 1
    • Writing Exploit - Part 2
    • Writing Exploit - Part 3
    • Exercise: Imposter Syndrome
  •   Protecting The Network
    • Protecting the Network
    • HIDS and HIPS for ArpSpoof
    • Router Security Settings
    • Writing IDS Rules for Nmap Scan Detection
    • Using Drop Rule in Snort for IPS
    • Wireshark
  •   Where To Go From Here?
    • Thank You!
    • Review This Course!
    • Become An Alumni
    • Learning Guideline
    • ZTM Events Every Month
    • LinkedIn Endorsements

Taught by

Aleksa Tamburkovski

Reviews

Start your review of Advanced Ethical Hacking Bootcamp: Network Hacking & Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.