The 2022 Ultimate Ethical Hacking Super-Sized Certification Prep Bundle

2 Reviews
488 Enrolled
9 Courses & 160 Hours
$34.00$1,800.00
You save 98% -

What's Included

Wireshark: Packet Analysis & Ethical Hacking: Core Skills
  • Experience level required: Beginner
  • Access 204 lectures & 13 hours of content 24/7
  • Length of time users can access this course: Lifetime

Course Curriculum

204 Lessons (13h)

  • Your First Program
  • Introduction
    Introduction10:41
    Answering your questions1:53
    Wireshark Installation- Windows5:50
    Wireshark Installation- Mac OS3:06
  • Wireshark Basics
    The best way to learn!2:52
    Capture frames - packets - segments15:11
    Why are no packets captured9:29
    Port SPAN - Mirroring5:44
  • OSI Model
    OSI Model - Part 1 - OSI Model Introduction1:59
    OSI Model - Part 2 - OSI Model Layers4:07
    OSI Model - Part 3 - Split of concentration6:26
    OSI Model - Part 4 - Layer 7 Application Layer2:41
    OSI Model - Part 5 - Layer 6 Presentation Layer2:06
    OSI Model - Part 6 - Layer 5 Session Layer1:23
    OSI Model - Part 7 - Top layers versus lower layers0:23
    OSI Model - Part 8 - Transport Layer4:53
    OSI Model - Part 9 - Network Layer2:59
    OSI Model - Part 10 - Data Link Layer3:25
    OSI Model - Part 11 - Physical Layer4:30
    OSI Model - Part 12 - Host Communication3:37
    OSI Model - Part 13 - Encapsulation2:51
    OSI Model - Part 14 - TCPIP versus OSI Model6:12
    OSI Model - Part 15 - Demo Wireshark4:34
  • Wireshark Filters
    Wireshark Display filters2:45
    Practical Demonstration of Wireshark Display filters10:48
    Two types of filters1:35
    Wireshark Capture Filters4:52
    Wireshark Filters-IP address - protocols8:27
  • Wireshark: Hacking Passwords
    Telnet Password & Data Captures9:00
    TFTP Password & Data Capture3:06
    FTP Password & Data Capture1:38
    HTTP Data Capture4:58
    Cisco router HTTP Password Capture7:50
  • Hacking VoIP
    Replay Voice over IP calls (Virtual IP Phones)15:56
    Capture and replay voice calls (Virtual & Physical IP Phones)6:47
  • Protocol Analysis: Can you troubleshoot the network?
    DTP Lab- Quiz0:52
    DTP Lab- Answers8:56
    CDP, LLDP Lab: Quiz1:56
    CDP, LLDP Lab: Answers8:32
    OSPF Lab- Quiz2:36
    OSPF Lab- Answers Part 114:08
    OSPF Lab- Answers Part 22:05
    OSPF Troubleshooting Lab 1- Question1:52
    OSPF Troubleshooting Lab 1- Answers11:27
    OSPF Troubleshooting Lab 2- Question1:02
    OSPF Troubleshooting Lab 2- Answers5:30
    OSPF Troubleshooting Lab 3- Question1:24
    OSPF Troubleshooting Lab 3- Answers7:27
    EIGRP Lab- Questions1:23
    EIGRP Lab- Answers8:07
    EIGRP Troubleshooting Lab 1-Question1:15
    EIGRP Troubleshooting Lab 1- Answers5:10
    EIGRP Troubleshooting Lab 2- Question0:59
    EIGRP Troubleshooting Lab 2- Answers3:10
    BGP Lab: Question1:20
    BGP Lab: Answers11:09
    BGP Troubleshooting Lab: Question1:04
    BGP Troubleshooting Lab: Answers7:16
  • Wireshark Tips and Tricks
    Quick Wireshark Filters3:59
    Wireshark Profiles7:43
    Wireshark Conversation Filters1:41
    Wireshark Statistics5:13
    Wireshark Protocol Hierarchy5:47
    Wireshark Conversations and IO Graph5:28
    Wireshark Flow Graph4:47
  • tshark and Termshark
    Overview and tshark install and packet capture5:49
    Termshark5:55
  • Python Wireshark scripting
    tshark and Pyshark installation5:10
    Basic Pyshark testing9:26
    Pyshark script6:34
  • Python Wireshark Password Captures
    Lab overview and setup6:39
    iPython and interactive OSPF script6:10
    OSPF Password Python script6:33
    FTP Password Capture Python script5:03
    Telnet Password Capture Python Script5:18
  • Kali Linux: Installation
    Import Kali Linux (Windows 10 - VirtualBox)9:04
  • Kali Linux: Network Attack Demonstrations
    Network Overview3:49
    DTP Attack Demo4:21
    VTP Attack Demo Part 15:22
    VTP Attack Demo Part 29:03
    Spanning Tree Attack Demo2:18
    Demo- Mitigation of attacks4:35
  • Kali Linux: DHCP attacks and Man-in-the-middle attack
    Overview of lab4:14
    DHCP Starvation attack3:48
    Rogue DHCP Server- MITM attack, Wireshark password sniffing6:55
  • Wireshark Quiz Questions
    Wireshark Quiz 1
    Wireshark Quiz 1 Answers
    Wireshark Quiz 2
    Wireshark Quiz 2 Answers
    Wireshark Quiz 3
    Wireshark Quiz 3 Answers
    Wireshark Quiz 4
    Wireshark Quiz 4 Answers
    Wireshark Quiz 5
    Wireshark Quiz 5 Answers
    Wireshark Quiz 6
    Wireshark Quiz 6 Answers
    Wireshark Quiz 7
    Wireshark Quiz 7 Answers
    Wireshark Quiz 8
    Wireshark Quiz 8 Answers
    Wireshark Quiz 9
    Wireshark Quiz 9 Answers
    Wireshark Quiz 10
    Wireshark Quiz 10 Answers
    Wireshark Quiz 11
    Wireshark Quiz 11 Answers
    Wireshark Quiz 12
    Wireshark Quiz 12 Answers
    Wireshark Quiz 13
    Wireshark Quiz 13 Answers
    Wireshark Quiz 14
    Wireshark Quiz 14 Answers
    Wireshark Quiz 15
    Wireshark Quiz 15 Answers
    Wireshark Quiz 16
    Wireshark Quiz 16 Answers
    Wireshark Quiz 17
    Wireshark Quiz 17 Answers
    Wireshark Quiz 18
    Wireshark Quiz 18 Answers
    Wireshark Quiz 19
    Wireshark Quiz 19 Answers
    Wireshark Quiz 20
    Wireshark Quiz 20 Answers
    Wireshark Quiz 21
    Wireshark Quiz 21 Answers
    Wireshark Quiz 22
    Wireshark Quiz 22 Answers
    Wireshark Quiz 23
    Wireshark Quiz 23 Answers
  • VTP Theory and demonstrations
    VTP Overview5:27
    VTP Overview Part 25:16
    VTP Modes6:12
    VTP Versions1:22
    VTP on real 3750 switch6:05
    VTP - Demo Erase switch config0:31
    VTP Pruning4:28
    VTP Defaults0:46
    VTP Warnings!2:00
    VTP Demo Overview & Switch 1 config6:43
    VTP Demo Autonegotiation S24:44
    VTP Demo VTP Client6:50
    VTP Demo Client overrides server8:42
    VTP Network Meltdown! VLANs removed from database!8:29
    VTP Demo Network Back Again and Transparent Mode2:40
    VTP Physical swtiches auto learn VTP domain4:45
  • Spanning Tree theory and demonstrations
    Spanning Tree Overview2:05
    Versions of Spanning Tree4:07
    Why is Spanning Tree Required7:27
    BPDUs and Bridge IDs2:38
    Demo STP Root7:36
    Root Ports and Designated Ports8:24
    Extended Bridge ID4:17
    PortFast2:35
    Path Cost Part 11:42
    Path Cost Part 25:30
    Path Cost Part 34:21
    PVST versus RPVST Port States8:23
    RPVST and PVST Interoperability2:36
    802.1w and 802.1s Overview3:03
    802.1w7:09
    Demo 802.1w7:19
    802.1w Link Types3:06
    802.1w Proposals6:18
    802.1s MSTP6:22
    Spanning Tree Comparison Summary3:35
  • Port SPAN (Mirroring) theory and demonstrations
    SPAN Introduction1:10
    SPAN network overview1:57
    Tests before SPAN6:27
    Configure SPAN8:27
    SPAN Ingress Options3:40
    SPAN Options6:13
    SPAN - Multiple Sessions3:25
  • BGP theory and demonstrations
    BGP and the CCNA1:28
    BGP Overview2:56
    BGP Looking Glass5:47
    GNS3 BGP Part 13:05
    GNS3 BGP Part 28:28
    GNS3 BGP Part 39:35
    GNS3 BGP Part 47:54
    GNS3 BGP Part 53:43
    GNS3 BGP Part 611:03
    GNS3 BGP Part 78:19
    GNS3 BGP Part 84:28
    GNS3 BGP Part 97:11
    GNS3 BGP Part 103:48
  • Dynamic Trunk Protocol - DTP
    DTP Theory2:08
    DTP GNS3 Demo Part 17:09
    DTP GNS3 Demo Part 23:37
    DTP GNS3 Demo Part 37:33
  • CDP Overview
    CDP Introduction9:43
    CDP Demo6:16
  • GNS3 Campus 1: CDP and LLDP
    CDP Demo Basic discovery7:28
    CDP Demo Disable globally and per interface6:49
    CDP Demo Command Options4:20
    LLDP Demo Discover Linux Servers6:41
  • Port Security
    Port Security Overview3:13
    Port Security and security mechanisms1:23
    MAC addresses Port Security Static, Dynamic, Sticky3:11
    Port Security Demo Part 19:03
    Port Security Demo Part 29:19
    Port Security Demo Sticky2:52
    Port Security Error disable and auto recovery5:14

Wireshark: Packet Analysis & Ethical Hacking: Core Skills

DB
David Bombal

David Bombal | CCIE #11023 Emeritus, Over 15 Years of Network Training Experience

4.6/5 Instructor Rating: ★ ★ ★ ★

David Bombal passed his Cisco Certified Internetwork Expert Routing and Switching exam in January 2003 and is one of a small percentage of Cisco Engineers that pass their CCIE labs on their first attempt. David qualified as a Cisco Certified Systems Instructor (CCSI #22787) many years ago! He has been training Cisco courses for over 15 years and has delivered instructor-led courses in various countries around the world covering a wide range of Cisco topics from CCNA to CCIE. David is very active on social media and has over 250,000 YouTube subscribers and has posted over 1,000 free videos.

Description

Learn Wireshark practically. Wireshark pcapng files provided so you can practice while you learn! The course is very practical. You can practice while you learn! Learn how to analyze and interpret network protocols and leverage Wireshark for what it was originally intended: Deep Packet Inspection and network analysis. This course will show you have to hack network protocols using Kali Linux! Hack network protocols like DTP, VTP, STP, and DHCP using Ethical hacking tools included in Kali Linux.

4.7/5 average rating: ★ ★ ★ ★

  • Access 204 lectures & 13 hours of content 24/7
  • Troubleshoot networks using Wireshark
  • Capture VoIP, OSPF, HTTP, Telnet, & many other protocols using Wireshark
  • Learn how to use Wireshark for Ethical hacking
  • Improve your job prospects by adding Wireshark to your resumé
  • Understand & interpret network protocols.
  • Hack network protocols using Kali Linux

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Specs

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.