Hackers use sniffing to intercept network traffic. Explore sniffing and discover how ethical hackers prevent these types of attacks in this course from our Certified Ethical Hacker exam series.
- [Instructor] This course is an intermediate course intended for IT security professionals, network administrators, students, teachers, or anyone with an interest in learning more about the sniffing phase of ethical hacking, along with an understanding of why examining network traffic is important in an organization as part of an overall security framework. Participants should have a basic understanding of security concepts, along with networking terms and hardware devices including routers, switches, and firewalls.
In addition, participants should understand the OSI model, IP addressing, and subnets, basic cryptographic concepts and techniques, decimal, hexadecimal, and binary number representation, common protocols, and have an interest in the subject. To better prepare and understand the tools and techniques, participants should complete Introduction to Kali Linux with Malcolm Shore.
Note: The topics in this course will prepare you for key objectives on the Certified Ethical Hacker exam. Find an overview of the certification and the exam handbook at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Sniffing network traffic
- Passive vs. active attacks
- Comparing IPv4 to IPv6
- MAC and macof attacks
- Investigating DHCP attacks
- Detecting ARP and DNS spoofing
- Sniffing tools and techniques