Home Search Profile

Master Ethical Hacking: Network Exploits & Defense (2025)

Focused View

6:58:09

  • 1 -Welcome To The Course!.mp4
    03:56
  • 2 -How To Follow This Course.mp4
    04:24
  • 3 - Note 1.html
  • 3 - Note 2.html
  • 1 -DDoS Attacks Theory.mp4
    09:24
  • 2 -Denial of Service In Practice.mp4
    19:26
  • 2 -ddos.zip
  • 2 -vulnerable http server.zip
  • 1 -MAC address Spoofing Theory.mp4
    05:23
  • 2 -Bypassing Blacklist with spoof-mac.mp4
    11:26
  • 1 -MITM Explained.mp4
    07:25
  • 2 -Arp Spoofing In Practice.mp4
    13:40
  • 3 -Stealing Credentials with MITM Attack.mp4
    07:18
  • 1 -Existing DNS Attacks Explained.mp4
    08:55
  • 2 -DNS Spoofing Example.mp4
    19:27
  • 2 -dnsspoof.zip
  • 3 -Establishing Reverse Shell Through DNS Tunneling.mp4
    10:01
  • 1 -Zero Day Vulnerabilities In Protocols Explained.mp4
    07:04
  • 2 -Exploiting IPv6 Vulnerability.mp4
    16:24
  • 1 -DHCP Attacks Theory.mp4
    07:12
  • 2 -DHCP Starvation.mp4
    16:50
  • 2 -dhcpstarve.zip
  • 3 -Rogue DHCP.mp4
    08:03
  • 1 -Common Router Vulnerabilities.mp4
    07:01
  • 2 -Hacking Router With Various Methods.mp4
    10:57
  • 1 -Vulnerable Encryption Protocols.mp4
    05:41
  • 2 -Exploiting Vulnerable Encryption.mp4
    17:45
  • 2 -breakcaesar.zip
  • 2 -breakxor.zip
  • 2 -caesarcipher.zip
  • 2 -xor.zip
  • 1 -Project Exploiting Application Over The Network To Gain Reverse Shell.mp4
    03:31
  • 2 -Writing Exploit Part 1.mp4
    21:37
  • 2 -client.zip
  • 2 -vulnerable server.zip
  • 3 -Writing Exploit Part 2.mp4
    14:18
  • 4 -Writing Exploit Part 3.mp4
    09:37
  • 1 -How To Protect Your Network.mp4
    07:55
  • 2 -ARP Spoof IDSIPS.mp4
    31:29
  • 2 -arpspoofdetectandprotect.zip
  • 2 -arp detect.zip
  • 3 -Router Security Settings.mp4
    05:52
  • 3 - Writing IDSIPS Rules with Snort.html
  • 4 - Wireshark.html
  • 1 -What is Networking.mp4
    02:44
  • 2 -OSI Model.mp4
    09:20
  • 3 -Encapsulation & Decapsulation.mp4
    11:11
  • 4 -IPv4 Explained.mp4
    09:27
  • 5 -IPv6 Explained.mp4
    08:39
  • 6 -IPv4 vs IPv6.mp4
    08:26
  • 7 -Subnetting.mp4
    06:37
  • 8 -IP Protocol Types.mp4
    05:08
  • 9 -What are Ports.mp4
    04:15
  • 10 -HTTP, HTTPS.mp4
    03:21
  • 11 -DHCP.mp4
    05:47
  • 12 -DNS.mp4
    09:04
  • 13 -Networking Devices.mp4
    13:01
  • 14 -MAC address.mp4
    04:37
  • 15 -ARP.mp4
    04:31
  • More details


    Course Overview

    This advanced course teaches offensive network security techniques, exploit development, and defensive countermeasures using Kali Linux, Python, and virtualization environments.

    What You'll Learn

    • Execute MITM, DDoS, and DNS attacks in lab environments
    • Develop custom Python hacking tools and write exploits
    • Implement network protection with IDS/IPS rules

    Who This Is For

    • Aspiring ethical hackers and penetration testers
    • Network security professionals advancing their skills
    • Developers wanting to understand network vulnerabilities

    Key Benefits

    • Hands-on with real attack vectors and zero-day exploits
    • From offensive techniques to defensive implementations
    • Bonus networking fundamentals section included

    Curriculum Highlights

    1. Network attack methodologies and tools
    2. Exploit development and reverse engineering
    3. Network protection and hardening techniques
    Focused display
    • language english
    • Training sessions 43
    • duration 6:58:09
    • Release Date 2025/04/26

    Courses related to Ethical Hacking

    Courses related to Computer Network

    Courses related to Network Engineering

    Subtitles
    Master Windows Server 2025 Group Policy Like a Pro
    Master Windows Server 2025 Group Policy Like a Pro
    1:23:45
    English subtitles
    02/09/2025
    Subtitles
    Master VMware Horizon v8: Complete 2024 Deployment Guide
    Master VMware Horizon v8: Complete 2024 Deployment Guide
    11:57:09
    English subtitles
    02/05/2025