Back to search results

CEH v12: Sniffing and Poisoning

Publisher:
Skillsoft

Course Series:
Certified Ethical Hacker (CEH) v12

Specialties:
IT WhatsNew

Course Description:
Networks are constantly sending data to deliver messages and keep network services working, but those data packets may contain sensitive information like passwords. In this course, you'll examine how an attacker can gain access to sensitive data through packet sniffing. You'll learn how attackers can manipulate Dynamic Host Configuration Protocol (DHCP), which can allow them to then intercept target host communications. Next, you'll explore how attackers can manipulate Address Resolution Protocol (ARP) by taking advantage of the default functions of ARP. You'll move on to examine how attackers trick users into sharing personal information through domain name system (DNS) poisoning. Finally, you'll learn about common security controls that allow networks to communicate, while still adding layers of scrutiny, control, and obfuscation. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.

Other courses in this series:
CEH v12: AD Enumeration, Mimikatz, and Pivoting Techniques CEH v12: App Layer Attacks, Botnets, and DoS Countermeasures CEH v12: Buffer Overflows, Privilege Escalation, and System Access CEH v12: Cloud Computing, Containers, Hacking, and Security Controls CEH v12: Cryptography, Algorithms, Implementations, and Tools CEH v12: Cyber Kill Chain, TTPs, Behaviors, and Threat Hunting CEH v12: Cybersecurity Concepts, Attacks, and Information Warfare CEH v12: DoS, DDoS, Volumetric, and Protocol Attacks CEH v12: Fileless Malware, Malware Analysis, and Countermeasures CEH v12: Footprinting and Social Engineering Recon and Countermeasures CEH v12: Footprinting, Google Dorks, Search Engines, and Subdomains CEH v12: Hacking Methodology, MITRE ATT&CK Framework, and Diamond Model CEH v12: Hijacking Concepts and Countermeasures CEH v12: IDOR Attacks, File Inclusion Attacks, Web APIs, and Webhooks CEH v12: Incident Management, ML, AI, and Regulations CEH v12: Intrusion Detection and Prevention, Firewalls, and Honeypots CEH v12: IoT Threats, Vulnerabilities, Attack Tools, and Countermeasures CEH v12: Malware, Threats, Trojans, and Viruses CEH v12: Mobile Hacking, OS Security, and Device Management CEH v12: NetBIOS, SMB, SNMP, and LDAP Enumeration CEH v12: Network Scanning, TCP, Host Discovery, and Port/Service Scanning CEH v12: Nmap IDLE IPID, UDP, and SCTP Scans CEH v12: Nmap TCP Scans CEH v12: NTP, NFS, SMTP, and FTP Enumeration CEH v12: Operational Technology Concepts, Attack Tools, and Countermeasures CEH v12: Passwords Attacks, Extraction, and Cracking CEH v12: PKI, Cryptanalysis, and Attack Countermeasures CEH v12: Recon Tools and Tactics CEH v12: Risk Management, Cyber Threat Intelligence, and Threat Modeling CEH v12: Scan Optimization, OS Identification, and IDS/Firewall Evasion CEH v12: Sniffing and Poisoning CEH v12: Social Engineering, Insider Threats, and Identity Theft CEH v12: SQL Injection and SQLMap CEH v12: SQL Injection Concepts and Attacks CEH v12: Steganography and Avoiding Detection CEH v12: Vulnerability Assessment Types, Models, Tools, and Reports CEH v12: Vulnerability Assessment, Management, and Classification CEH v12: Web App Hacking Methodology, CSRF Attacks, and Input Filter Evasion CEH v12: Web Application Attacks and Vulnerabilities CEH v12: Web Server Hacking, Attacks, and Attack Methodologies CEH v12: Windows Authentication CEH v12: Wireless Concepts, Threats, and Hacking Tools CEH v12: Wireless Hacking and Countermeasures
Back to Top