Advanced Network Attacks, Web Hacking, and Cryptography

This course is part of Certified Ethical Hacker (CEH) v.12 Specialization

Instructor: Packt - Course Instructors

What you'll learn

  •   Master techniques for session hijacking, network-level attacks, and application vulnerabilities.
  •   Implement web application defenses against OWASP Top 10 vulnerabilities.
  •   Explore SQL injection, wireless hacking, and cryptographic attack methodologies.
  •   Defend mobile platforms, IoT systems, and cloud environments with effective countermeasures.
  •   
  • Skills you'll gain

  •   Wireless Networks
  •   Internet Of Things
  •   Cloud Security
  •   Open Web Application Security Project (OWASP)
  •   Intrusion Detection and Prevention
  •   Secure Coding
  •   Web Applications
  •   Penetration Testing
  •   Network Security
  •   Application Security
  •   Encryption
  •   Vulnerability Assessments
  •   Mobile Security
  •   Threat Modeling
  •   Cryptography
  •   Web Servers
  • There are 10 modules in this course

    The course begins by delving into network and perimeter hacking techniques, exploring methods to bypass security systems, and demonstrating countermeasures. Progressing further, you’ll navigate web application hacking strategies, covering web servers, common vulnerabilities, and ethical hacking methodologies, including the OWASP Top 10. Dive deep into SQL injection techniques and wireless network exploitation, mastering tools, methods, and defenses for each. Explore cutting-edge topics like mobile platform vulnerabilities, IoT device exploitation, and operational technology security. The course concludes with an extensive study of cryptography, from foundational concepts to practical tools and cryptanalysis, preparing you to implement robust encryption strategies and mitigate cryptographic attacks effectively. Ideal for cybersecurity professionals, ethical hackers, and IT specialists, this course requires a foundational knowledge of networking and basic cybersecurity concepts. It is best suited for intermediate-level learners aiming to advance their skills in offensive and defensive security strategies.

    Network and Perimeter Hacking - Evading Firewalls, IDS, and Honeypots

    Web Application Hacking - Hacking Web Servers

    Web Application Hacking - Hacking Web Applications

    Web Application Hacking - SQL Injection

    Wireless Network Hacking - Hacking Wireless Networks

    Mobile Platform, IoT, and OT Hacking - Hacking Mobile Platforms

    Mobile Platform, IoT, and OT Hacking - IoT and OT Hacking

    Cloud Computing

    Cryptography

    Explore more from Security

    ©2025  ementorhub.com. All rights reserved