Call : (+91) 968636 4243
Mail : info@EncartaLabs.com
EncartaLabs

Network Hacking and Security

( Duration: 1 Day )

By attending Network Hacking and Security workshop, delegates will learn:

  • To understand what a network is?
  • How communication happens in a network?
  • How network attacks are classified based on Physical Layer of OSI model?
  • How network attacks are classified based on Data link Layer of OSI model?
  • How network attacks are classified based on Network Layer of OSI model?
  • How network attacks are classified based on Transport Layer of OSI model?
  • Possible countermeasures to defend against these attacks
  • Acquire an expertise on network security

  • This Network Hacking and Security training course is perfect for existing network architects, network administrators, network security professionals as well as anybody who is passionate about developing their skills in the field of internet security.

COURSE AGENDA

1

Introduction

  • Network Objective and Outcome
  • Network Basics
  • Introduction - Network hacking and security
2

Physical Layer Attacks - Wired

  • Physical Layer Attack
  • Physical Layer-Wired
  • Mitigation technique-Physical layer security
3

Datalink Layer Attacks - Wired

  • MAC Spoofing
  • MAC Flooding
  • ARP Poisoning
  • DNS Spoofing
  • DHCP Starvation
  • Rogue DHCP Attack
  • Mitigation technique-Datalink layer security
4

Network Layer Attacks

  • IP Spoofing
  • Passive MITM
  • Active MITM
  • ICMP Flooding
  • SMURF Attack
  • Ping of Death
  • Ping of Death Attack
  • Mitigation technique-Network layer security
5

Transport Layer Attacks

  • Transport Layer
  • TCP Flooding
  • UDP Flooding
  • Mitigation technique-Transport layer security
6

Wireless Network Attacks

  • Wireless Basics
  • Introduction to Wireless Hacking and Security
7

Physical Layer Attacks - Wireless

  • Physcial Layer Attack
  • Physical Layer-Wireless
  • Mitigation technique-Wireless-Physical layer security
8

Datalink Layer Attacks - Wireless

  • War Driving
  • Hidden Hotspot
9

Datalink Layer Attacks - WEP Cracking

  • WEP Working
  • Packet Injection
  • Caffe Latte
  • Hirte Attack
  • Koreks chop chop
10

Datalink Layer Attacks - WPA Cracking

  • WPA Working
  • WPA Cracking
11

Datalink Layer Attacks - WPA II Cracking

  • WPA 2 Basics
  • WPA 2 Cracking
  • Rogue AP attack
  • Mitigation technique-Wireless-Datalink layer security

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 6,000 various courses on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting https://www.encartalabs.com/course-catalogue-all.php

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.

Top
Notice
X