Master Ethical Hacking: Network Exploits & Defense (2025)
Focused View
6:58:09
1 -Welcome To The Course!.mp4
03:56
2 -How To Follow This Course.mp4
04:24
3 - Note 1.html
3 - Note 2.html
1 -DDoS Attacks Theory.mp4
09:24
2 -Denial of Service In Practice.mp4
19:26
2 -ddos.zip
2 -vulnerable http server.zip
1 -MAC address Spoofing Theory.mp4
05:23
2 -Bypassing Blacklist with spoof-mac.mp4
11:26
1 -MITM Explained.mp4
07:25
2 -Arp Spoofing In Practice.mp4
13:40
3 -Stealing Credentials with MITM Attack.mp4
07:18
1 -Existing DNS Attacks Explained.mp4
08:55
2 -DNS Spoofing Example.mp4
19:27
2 -dnsspoof.zip
3 -Establishing Reverse Shell Through DNS Tunneling.mp4
10:01
1 -Zero Day Vulnerabilities In Protocols Explained.mp4
07:04
2 -Exploiting IPv6 Vulnerability.mp4
16:24
1 -DHCP Attacks Theory.mp4
07:12
2 -DHCP Starvation.mp4
16:50
2 -dhcpstarve.zip
3 -Rogue DHCP.mp4
08:03
1 -Common Router Vulnerabilities.mp4
07:01
2 -Hacking Router With Various Methods.mp4
10:57
1 -Vulnerable Encryption Protocols.mp4
05:41
2 -Exploiting Vulnerable Encryption.mp4
17:45
2 -breakcaesar.zip
2 -breakxor.zip
2 -caesarcipher.zip
2 -xor.zip
1 -Project Exploiting Application Over The Network To Gain Reverse Shell.mp4
03:31
2 -Writing Exploit Part 1.mp4
21:37
2 -client.zip
2 -vulnerable server.zip
3 -Writing Exploit Part 2.mp4
14:18
4 -Writing Exploit Part 3.mp4
09:37
1 -How To Protect Your Network.mp4
07:55
2 -ARP Spoof IDSIPS.mp4
31:29
2 -arpspoofdetectandprotect.zip
2 -arp detect.zip
3 -Router Security Settings.mp4
05:52
3 - Writing IDSIPS Rules with Snort.html
4 - Wireshark.html
1 -What is Networking.mp4
02:44
2 -OSI Model.mp4
09:20
3 -Encapsulation & Decapsulation.mp4
11:11
4 -IPv4 Explained.mp4
09:27
5 -IPv6 Explained.mp4
08:39
6 -IPv4 vs IPv6.mp4
08:26
7 -Subnetting.mp4
06:37
8 -IP Protocol Types.mp4
05:08
9 -What are Ports.mp4
04:15
10 -HTTP, HTTPS.mp4
03:21
11 -DHCP.mp4
05:47
12 -DNS.mp4
09:04
13 -Networking Devices.mp4
13:01
14 -MAC address.mp4
04:37
15 -ARP.mp4
04:31
More details
Course Overview
This advanced course teaches offensive network security techniques, exploit development, and defensive countermeasures using Kali Linux, Python, and virtualization environments.
What You'll Learn
- Execute MITM, DDoS, and DNS attacks in lab environments
- Develop custom Python hacking tools and write exploits
- Implement network protection with IDS/IPS rules
Who This Is For
- Aspiring ethical hackers and penetration testers
- Network security professionals advancing their skills
- Developers wanting to understand network vulnerabilities
Key Benefits
- Hands-on with real attack vectors and zero-day exploits
- From offensive techniques to defensive implementations
- Bonus networking fundamentals section included
Curriculum Highlights
- Network attack methodologies and tools
- Exploit development and reverse engineering
- Network protection and hardening techniques
Focused display
- language english
- Training sessions 43
- duration 6:58:09
- Release Date 2025/04/26