Cyber Security | اختراق الشبكات والأجهزة عملياً Udemy
Price: USD 20
  • Duration: Flexible

Course details

.


:

1-
( Metasploitable) Vmware Workstation .


2- :
.


3- :

.


4- :
Eavesdropping.

5- :
.


.


In this course, we will start by learning the field of penetration testing in networks and devices from scratch and we will cover the most important practical and theoretical concepts. This course will be the launch for you in the world of cybersecurity, as you will apply the various attacks used by hackers to access sensitive information and you will learn about various tools and techniques and the latest in the field of penetration Networks, devices and even better, you will implement all of these attacks while you are fully aware and understand the theory behind these attacks.


The Course discuss the following concepts:


1- The First sections:

in this section will download all the necessary tools in this field starting from virtual machine (Kali Linux, Windows, Metasploitable), and the method of installing them on the most important software that runs virtual systems "Vmware Workstation" will be explained, then the basics of networks will be explained in a simplified and comprehensive way to be understood also the way devices transmit data within a network will be explained.


2- Pre-Access stage:


Here, very important tools will be used in the field of network attacks, and we will implement various attacks that hackers can do before accessing and exploiting the network key.


3- Gaining Access Stage:


At this stage, all types of encryption used in Wi-Fi networks will be explained, so these networks will be decrypted and penetrated by using strong and practical techniques and methods.


4- Post-Access Stage:


At this stage, information about the devices on the network will be practically collected, and a group of the most dangerous attacks will be carried out against these devices to pull sensitive data and to monitor all data transmitted between devices using Eavesdropping methods.


5- Exploiting Devices Stage:


After the network is hacked from here, we start using very dangerous techniques to discover and exploit vulnerabilities in the devices, and we will build malicious software and use it on the devices on the network to withdraw their files and control them.


In the end, this course will benefit you with your resume and professional life, also on a personal level, you will understand all matters related to network and device penetration in this field.

CEH CERTIFIED ETHICAL HACKING


Updated on 02 May, 2023
Courses you can instantly connect with... Do an online course on Cybersecurity starting now. See all courses

Is this the right course for you?

Rate this page

Didn't find what you were looking for ?

or