Network Security




Network Security

Network security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network. It targets a variety of threats and stops them from entering or spreading on your network.

The video tutorial starts with the basics of network and scanning techniques. You will learn to search hosts and find open ports and services in a network. You will also learn the most important attacks on networks such as dos attacks, gaining access attacks, exploitation attacks, and post exploitation attacks. Finally, the course will teach you techniques you can use to defend networks with firewalls, IDS, IPS, and other network security devices.

At the end of this course, you’ll have a practical knowledge of the ways in which hackers can infiltrate a network over the Internet and will be familiar with tools such as nmap, Wireshark, and Metasploit

About the Author

Sunil K. Gupta is a Computer Science Engineer as well as a web and network Security Specialist working in the field of Cyber Security. In cyber Industry we work on different hacking tools and techniques.

His strengths are:-

  •     Vulnerability assessment
  •     Penetration testing
  •     Wi-Fi assessment
  •     Intrusion detection
  •     Risk identification
  •     Data analysis
  •     Reports and briefing

The best security tools he has used are: Class-Dump-Z, Cycript, GNU Debugger, Fiddler, Nmap, Wikto, Brutus, Wireshark, Burp Proxy, Paros Proxy, Cain and Abel, John the Ripper, Hydra, Metasploit, netcat, openssl, ike tools, Back track tools, Nessus, IBM-AppScan, Acunetix, Nikto, NetSparker, Microsoft Baseline Security Analyzer (MBSA), Web Securify, Nipper.

Platforms - Windows, Linux

Learn network security attacks and defensive techniques to secure networks from known and unknown sources

Url: View Details

What you will learn
  • Nmap and port scanning to discover hosts and services on a computer network
  • Metasploit and exploitation to verify vulnerability mitigations and manage security
  • Windows- and Linux-specific vulnerabilities

Rating: 4.3

Level: Intermediate Level

Duration: 2.5 hours

Instructor: Packt Publishing


Courses By:   0-9  A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z 

About US

The display of third-party trademarks and trade names on this site does not necessarily indicate any affiliation or endorsement of coursescompany.com.


© 2021 coursescompany.com. All rights reserved.
View Sitemap