All in One Offer! | Access Unlimited Courses in any category starting at just $29. Signup today. Offer Ends in: 9 Days!

Browse Library

  • Business Solutions
  • Become an Instructor
  • 0
    Shopping Cart

    Your Cart is empty. Keep shopping to find a course!

    Browse Courses
Get Unlimited Learning Access
$29
9 days left at this price!

It Includes

  • Get Full Access to the platform
  • Access upto 16000+ online courses
  • Play & Pause Course Viewing
  • HD Recorded Lectures
  • Access on Mobile/PC/Tablet
  • Includes Real Projects
  • Online iLab Access
  • Certificate of Completion
  • Download for offline viewing
  • Cancel Anytime
$29
  • Penetration testing, ethical hacking, computer network basics

This is a beginner level course on ethical hacking and computer network. The course is divided into 4 sections each comprising of 4-6 lectures followed by practice quiz. The graded quiz at the end of the course would enable the learners to judge about their understanding of the subject and learning curve. The topics include ethical hacking concepts, penetration testing, attack vectors, computer networking basics including networking devices, area networks, topologies, IP addressing, spoofing, sniffing, network mapper, wireless networks, wireless modes and several hands-on practical sessions to give an insight into the depth of the subject matter.

The course details is a follows.

Section 1 is about Introduction to ethical hacking

In this section there are 4 lectures. The first lecture gives an outline of information security discussing about activities in the Internet in 60 secs, information security elements and the security functionality and usability triangle. The second lecture explains the various types of network attacks that can hamper your system. The third lecture explains the different stages of penetration testing used for ethical hacking. It also includes the information security laws and standards. The fourth lecture explains the basic concepts of hacking and how it is different from ethical hacking. The meaning of black hat, grey hat and white hat hackers are dealt with.

 

Section 2 is about Network Fundamentals

This section comprises of 4 lectures and one practical session. The first lecture explains networking basics including various networking devices, area networks and topologies. The second lecture explains about network identifiers followed by MAC addressing and MAC spoofing in lectures 3 and 4. The fifth video gives a hands-on practical session on MAC address changing.

 

Section 3 is about Wireless Network Fundamentals

The section comprises of 4 lectures and two practical sessions. Lecture 1 talks about wireless networks followed by wireless modes and packet sniffing in lectures 2 and 3. The fourth video gives a hands-on practical session on Wireshark Network Packet Analyzer. The next lecture explains network mapper followed by a hands-on practical session on NMAP Network Mapper.

 

Section 4 is about IP Fundamentals

The section comprises of 4 lectures and two practical sessions. Lecture 1 talks about IP spoofing followed by a hands-on practical session on IP address changing. The next 3 lectures explain wired equivalent privacy or WEP, Wireless application protocols WPA and WPA2 followed by fake authentication concepts. The section ends with a hands-on practical session on wi-fi cracking.

  • This is a beginner level course. Everything will be taught here.
  • Fundamental knowledge of mathematics and computer networks would be beneficial.
View More...
  • Section 1 : Introductory Concepts 6 Lectures 00:33:56

    • Lecture 1 :
    • Lecture 2 :
    • Introduction to Ethical Hacking
    • Lecture 3 :
    • Attacks
    • Lecture 4 :
    • Penetration Testing
    • Lecture 5 :
    • Hacking
    • Lecture 6 :
    • Practice Quiz: Section 1
    • Answer all the five multiple choice questions
  • Section 2 : Network Fundamentals 7 Lectures 00:22:40

    • Lecture 1 :
    • Section 2 Overview
    • Lecture 2 :
    • Network Basics
    • Lecture 3 :
    • Network Identifiers
    • Lecture 4 :
    • MAC Address
    • Lecture 5 :
    • MAC Spoofing
    • Lecture 6 :
    • Hands-on - MAC Address Changing
    • Lecture 7 :
    • Practice Quiz: Section 2
    • Answer all the five multiple choice questions
  • Section 3 : Wireless Network Fundamentals 8 Lectures 00:47:33

    • Lecture 1 :
    • Section 3 Overview
    • Lecture 2 :
    • Wireless Network
    • Lecture 3 :
    • Wireless Modes
    • Lecture 4 :
    • Packet Sniffing
    • Lecture 5 :
    • Hands-on with Wireshark Network Packet Analyzer
    • Lecture 6 :
    • Network Mapper
    • Lecture 7 :
    • Hands-on with NMAP Network Mapper
    • Lecture 8 :
    • Practice Quiz; Section 3
    • Answer all the five multiple choice questions
  • Section 4 : IP Fundamentals 8 Lectures 00:37:52

    • Lecture 1 :
    • Section 4 Overview
    • Lecture 2 :
    • IP Spoofing
    • Lecture 3 :
    • Hands-on with IP address changing
    • Lecture 4 :
    • Wired Equivalent Privacy
    • Lecture 5 :
    • Wireless Application Protocol
    • Lecture 6 :
    • Fake Authentication
    • Lecture 7 :
    • Hands-on with Wi-Fi Cracking
    • Lecture 8 :
    • Practice Quiz: Section 4
    • Answer all the five multiple choice questions
  • How do i access the course after purchase?

    It's simple. When you sign up, you'll immediately have unlimited viewing of thousands of expert courses, paths to guide your learning, tools to measure your skills and hands-on resources like exercise files. There’s no limit on what you can learn and you can cancel at any time.
  • Are these video based online self-learning courses?

    Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic.
  • Can i play & pause the course as per my convenience?

    Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on.
  • How do i contact the instructor for any doubts or questions?

    Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want.
  • Do i need a pc to access the course or can i do it on mobile & tablet as well?

    Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly.
  • Do i get any certificate for the courses?

    Yes. Once you complete any course on our platform along with provided assessments by the instructor, you will be eligble to get certificate of course completion.
  • For how long can i access my course on the platform?

    You require an active subscription to access courses on our platform. If your subscription is active, you can access any course on our platform with no restrictions.
  • Is there any free trial?

    Currently, we do not offer any free trial.
  • Can i cancel anytime?

    Yes, you can cancel your subscription at any time. Your subscription will auto-renew until you cancel, but why would you want to?

33 Course Views

1 Courses

Master Trainer in Leadership and Management (CMI Level 5 certified, UK), having extensive experience in Higher Education, Change Management, Administration, Research Project Management and Doctoral Guidance in Artificial Intelligence, Network Security, Cognitive Radio, Ethical Hacking with nearly 27 years of career success in building & enhancing quality of innovation and learning in University education and to be worthy of international accreditation. Key Figure in Indian Academia with her IEEE Senior Membership, CMI Level 5 certification in Leadership and Management and Social Connect. Excellence in driving the development & implementation of objectives for curriculum and instructional evaluation; hiring quality faculty and generating National Grants, establishing Industrial and Foreign collaborations. Impeccable record of e-learning content development and delivering talks on network security, sensor network, DNA cryptography, information theory, organizing international workshops, seminars, conferences on futuristic skills related to Cyber Security and Network Security in collaboration with professional organizations as well as workshops on Pedagogy for Indian Engineering institutions. Possess an innate flair of executing research projects in the field of Network Security, Artificial Neural Network, Blockchain, Cognitive Radio, IoT Security and Cryptography.
View More...
  • learn-nxtgen-hacking-with-technology

    Learn NxtGen Hacking with Technolog...

    By : Gopikrishna C

    Lectures 80 Beginner Level 8:29:27
  • tcp-ip-the-complete-course

    TCP/IP: The Complete Course

    By : Lazaro (Laz) Diaz

    Lectures 17 Beginner Level 1:52:18
  • voip-configuration-and-attacking-hacking

    VoIP Configuration and Attacking (H...

    By : Arpit Mittal

    Lectures 6 Beginner Level 0:10:40
  • cissp-certification-introduction

    CISSP- Certification Introduction

    By : MUKESH SINGH

    Lectures 18 Intermediate Level 2:4:20
  • practical-blockchain-smart-contracts-ethereum-solidity

    Practical Blockchain & Smart Contra...

    By : Abhilash Nelson

    Lectures 40 Beginner Level 4:56:0
  • complete-ethical-hacking-penetration-testing-for-web-apps

    Complete Ethical Hacking & Penetrat...

    By : Abhilash Nelson

    Lectures 30 Beginner Level 3:28:56
Sign Up & Start Learning
By signing up, you agree to our Terms of Use and Privacy Policy
Create New Password
Enter your email address and we'll send you a link to reset your password.