Description
Learn network security attacks and defensive techniques to secure Networks from known and unknown sources.Network security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network. It targets a variety of threats and stops them from entering or spreading on your network. The video tutorial starts with the basics of network and scanning techniques. You will learn to search hosts and find open ports and services in a network. You will also learn the most important attacks on networks such as dos attacks, gaining access attacks, exploitation attacks, and post exploitation attacks. Finally, the course will teach you techniques you can use to defend networks with firewalls, IDS, IPS, and other network security devices. At the end of this course, you’ll have a practical knowledge of the ways in which hackers can infiltrate a network over the Internet and will be familiar with tools such as nmap, Wireshark, and MetasploitAbout The AuthorSunil K. Gupta is a Computer Science Engineer as well as a web and network Security Specialist working in the field of Cyber Security . In cyber Industry we work on different hacking tools and techniques.His strengths are:-Vulnerability assessment
Penetration testing
Wi-Fi assessment
Intrusion detection
Risk identification
Data analysis
Reports and briefingThe best security tools he has used are:Class-Dump-Z, Cycript, GNU Debugger, Fiddler, Nmap, Wikto, Brutus, Wireshark, Burp Proxy, Paros Proxy, Cain and Abel, John the Ripper, Hydra, Metasploit, netcat, openssl, ike tools, Back track tools, Nessus, IBM-AppScan, Acunetix, Nikto, NetSparker, Microsoft Baseline Security Analyzer (MBSA), Web Securify, Nipper.Platforms - Windows, Linux
Course programme
Introducing Network Security
5 lectures 30:00
The Course Overview
This video will give you an overview about the course.
Overview of Network Security
In this video, we will find various goals of network security.
• List goals of network security
• Explain network goals
• Explain Network security
Discussion of the Different Types of Vulnerabilities in Networks
In this video, we will be listing major and minor vulnerabilities.
• Learn about vulnerabilities in network
• List vulnerabilities
• Explain vulnerabilities like missing patches , default passwords
Network Vulnerability Test Scope and Process
In this video, we will look at Test Scope, and Process of VA.
• List test scopes
• Explain test scopes
• Explain about process of Vulnerability Assessment
Installation of Virtual Machines
In this video, we will look at the process of Installation.
• VMware Installation
• Kali Linux Installation
• Windows Installation
Introducing Network Security- Quiz
Introducing Network Security
5 lectures 30:00
The Course Overview
This video will give you an overview about the course.
Overview of Network Security
In this video, we will find various goals of network security.
• List goals of network security
• Explain network goals
• Explain Network security
Discussion of the Different Types of Vulnerabilities in Networks
In this video, we will be listing major and minor vulnerabilities.
• Learn about vulnerabilities in network
• List vulnerabilities
• Explain vulnerabilities like missing patches , default passwords
Network Vulnerability Test Scope and Process
In this video, we will look at Test Scope, and Process of VA.
• List test scopes
• Explain test scopes
• Explain about process of Vulnerability Assessment
Installation of Virtual Machines
In this video, we will look at the process of Installation.
• VMware Installation
• Kali Linux Installation
• Windows Installation
Introducing Network Security- Quiz
The Course Overview
This video will give you an overview about the course.
The Course Overview
This video will give you an overview about the course.
The Course Overview
This video will give you an overview about the course.
The Course Overview
This video will give you an overview about the course.
This video will give you an overview about the course.
This video will give you an overview about the course.
Overview of Network Security
In this video, we will find various goals of network security.
• List goals of network security
• Explain network goals
• Explain Network security
Overview of Network Security
In this video, we will find various goals of network security.
• List goals of network security
• Explain network goals
• Explain Network security
Overview of Network Security
In this video, we will find various goals of network security.
• List goals of network security
• Explain network goals
• Explain Network security
Overview of Network Security
In this video, we will find various goals of network security.
• List goals of network security
• Explain network goals
• Explain Network security
In this video, we will find various goals of network security.
• List goals of network security
• Explain network goals
• Explain Network security
In this video, we will find various goals of network security.
• List goals of network security
• Explain network goals
• Explain Network security
Discussion of the Different Types of Vulnerabilities in Networks
In this video, we will be listing major and minor vulnerabilities.
• Learn about vulnerabilities in network
• List vulnerabilities
• Explain vulnerabilities like missing patches , default passwords
Discussion of the Different Types of Vulnerabilities in Networks
In this video, we will be listing major and minor vulnerabilities.
• Learn about vulnerabilities in network
• List vulnerabilities
• Explain vulnerabilities like missing patches , default passwords
Discussion of the Different Types of Vulnerabilities in Networks
In this video, we will be listing major and minor vulnerabilities.
• Learn about vulnerabilities in network
• List vulnerabilities
• Explain vulnerabilities like missing patches , default passwords
Discussion of the Different Types of Vulnerabilities in Networks
In this video, we will be listing major and minor vulnerabilities.
• Learn about vulnerabilities in network
• List vulnerabilities
• Explain vulnerabilities like missing patches , default passwords
In this video, we will be listing major and minor vulnerabilities.
• Learn about vulnerabilities in network
• List vulnerabilities
• Explain vulnerabilities like missing patches , default passwords
In this video, we will be listing major and minor vulnerabilities.
• Learn about vulnerabilities in network
• List vulnerabilities
• Explain vulnerabilities like missing patches , default passwords
Network Vulnerability Test Scope and Process
In this video, we will look at Test Scope, and Process of VA.
• List test scopes
• Explain test scopes
• Explain about process of Vulnerability Assessment
Network Vulnerability Test Scope and Process
In this video, we will look at Test Scope, and Process of VA.
• List test scopes
• Explain test scopes
• Explain about process of Vulnerability Assessment
Network Vulnerability Test Scope and Process
In this video, we will look at Test Scope, and Process of VA.
• List test scopes
• Explain test scopes
• Explain about process of Vulnerability Assessment
Network Vulnerability Test Scope and Process
In this video, we will look at Test Scope, and Process of VA.
• List test scopes
• Explain test scopes
• Explain about process of Vulnerability Assessment
In this video, we will look at Test Scope, and Process of VA.
• List test scopes
• Explain test scopes
• Explain about process of Vulnerability Assessment
In this video, we will look at Test Scope, and Process of VA.
• List test scopes
• Explain test scopes
• Explain about process of Vulnerability Assessment
Installation of Virtual Machines
In this video, we will look at the process of Installation.
• VMware Installation
• Kali Linux Installation
• Windows Installation
Installation of Virtual Machines
In this video, we will look at the process of Installation.
• VMware Installation
• Kali Linux Installation
• Windows Installation
Installation of Virtual Machines
In this video, we will look at the process of Installation.
• VMware Installation
• Kali Linux Installation
• Windows Installation
Installation of Virtual Machines
In this video, we will look at the process of Installation.
• VMware Installation
• Kali Linux Installation
• Windows Installation
In this video, we will look at the process of Installation.
• VMware Installation
• Kali Linux Installation
• Windows Installation
In this video, we will look at the process of Installation.
• VMware Installation
• Kali Linux Installation
• Windows Installation
Introducing Network Security- Quiz
Introducing Network Security- Quiz
Introducing Network Security- Quiz
Introducing Network Security- Quiz
Network Scanning and Information Gathering
4 lectures 40:27
Various Network Footprinting Techniques
In this video, we will be listing various Foot printing techniques.
• Explain foot printing
• List tools
• Run Port scan using nmap
Securing Networks by Detecting Footprinting
In this video, we will look at detection of foot printing.
• Define detection
• Explore tools for detection
• Use of packet analyzer
Scanning Techniques of Networks
In this video, we will be listing various Scanning tools.
• Explanation about Scanning
• List tools
• Run port scan using Nessus
Securing Networks Techniques Against Scanning
In this video, we will look at Detection of Scanning.
• Defining Scanning detection
• List tools
• Explain use of packet analyzer
Network Scanning and Information Gathering- Quiz
Network Scanning and Information Gathering.
4 lectures 40:27
Various Network Footprinting Techniques
In this video, we will be listing various Foot printing techniques.
• Explain foot printing
• List tools
• Run Port scan using nmap
Securing Networks by Detecting Footprinting
In this video, we will look at detection of foot printing.
• Define detection
• Explore tools for detection
• Use of packet analyzer
Scanning Techniques of Networks
In this video, we will be listing various Scanning tools.
• Explanation about Scanning
• List tools
• Run port scan using Nessus
Securing Networks Techniques Against Scanning
In this video, we will look at Detection of Scanning.
• Defining Scanning detection
• List tools
• Explain use of packet analyzer
Network Scanning and Information Gathering- Quiz
Various Network Footprinting Techniques
In this video, we will be listing various Foot printing techniques.
• Explain foot printing
• List tools
• Run Port scan using nmap
Various Network Footprinting Techniques
In this video, we will be listing various Foot printing techniques.
• Explain foot printing
• List tools
• Run Port scan using nmap
Various Network Footprinting Techniques
In this video, we will be listing various Foot printing techniques.
• Explain foot printing
• List tools
• Run Port scan using nmap
Various Network Footprinting Techniques
In this video, we will be listing various Foot printing techniques.
• Explain foot printing
• List tools
• Run Port scan using nmap
In this video, we will be listing various Foot printing techniques.
• Explain foot printing
• List tools
• Run Port scan using nmap
In this video, we will be listing various Foot printing techniques.
• Explain foot printing
• List tools
• Run Port scan using nmap
Securing Networks by Detecting Footprinting
In this video, we will look at detection of foot printing.
• Define detection
• Explore tools for detection
• Use of packet analyzer
Securing Networks by Detecting Footprinting
In this video, we will look at detection of foot printing.
• Define detection
• Explore tools for detection
• Use of packet analyzer
Securing Networks by Detecting Footprinting
In this video, we will look at detection of foot printing.
• Define detection
• Explore tools for detection
• Use of packet analyzer
Securing Networks by Detecting Footprinting
In this video, we will look at detection of foot printing.
• Define detection
• Explore tools for detection
• Use of packet analyzer
In this video, we will look at detection of foot printing.
• Define detection
• Explore tools for detection
• Use of packet analyzer
In this video, we will look at detection of foot printing.
• Define detection
• Explore tools for detection
• Use of packet analyzer
Scanning Techniques of Networks
In this video, we will be listing various Scanning tools.
• Explanation about Scanning
• List tools
• Run port scan using Nessus
Scanning Techniques of Networks
In this video, we will be listing various Scanning tools.
• Explanation about Scanning
• List tools
• Run port scan using Nessus
Scanning Techniques of Networks
In this video, we will be listing various Scanning tools.
• Explanation about Scanning
• List tools
• Run port scan using Nessus
Scanning Techniques of Networks
In this video, we will be listing various Scanning tools.
• Explanation about Scanning
• List tools
• Run port scan using Nessus
In this video, we will be listing various Scanning tools.
• Explanation about Scanning
• List tools
• Run port scan using Nessus
In this video, we will be listing various Scanning tools
Attacks on Networks- Quiz
...