We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Sniffing and Spoofing with Kali Linux

Alexander Tushinsky

Having access to an internal network can provide a wealth of information, if you know how to look for it. This course will teach you Sniffing and Spoofing techniques using Ettercap and TCPDump.

Read more

Having access to an internal network can provide a wealth of information, if you know how to look for it. This course will teach you Sniffing and Spoofing techniques using Ettercap and TCPDump.

Once a foothold is established within a network, the next logical step is to try and capture the traffic of other systems to help gather intelligence. Having access to an internal network can provide a wealth of information, if you know how to look for it. In this course, Sniffing and Spoofing with Kali Linux, you’ll learn to use network packet inspection to your advantage. First, you’ll explore the ability to sniff and look at network traffic by using Ettercap and TCPDump to create a MAC flood attack. Next, you’ll discover how to perform an ARP poisoning attack, which establishes you as the “man-in-the-middle”, spying on traffic between a target PC and the router. Finally, you can implement a DNS spoofing attack, which ultimately can easily help you establish an additional foothold and provide you with a great deal of information about our target. When you’re finished with this course, you’ll have the skills and knowledge to work with Ettercap and TCPDump, tools needed to perform sniffing and spoofing attacks as part of a penetration test.

Enroll now

What's inside

Syllabus

Course Overview
Active and Passive Network Sniffing
Sniffing and Spoofing

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches Sniffing and Spoofing, valuable techniques for penetration testing
Builds strong foundation for understanding network sniffing and spoofing techniques
Instructors Alexander Tushinsky are highly regarded for their expertise in network sniffing and spoofing techniques
Teaches how to perform MAC flood attacks, ARP poisoning, and DNS spoofing attacks
Taught by Alexander Tushinsky, a renowned network security expert
May require learners to have some prior knowledge in network sniffing and spoofing techniques

Save this course

Save Sniffing and Spoofing with Kali Linux to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Sniffing and Spoofing with Kali Linux. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Sniffing and Spoofing with Kali Linux will develop knowledge and skills that may be useful to these careers:
Network Security Engineer
A Network Security Engineer designs, implements, and manages security controls to protect computer networks. They analyze security threats, develop security policies, and implement security measures to prevent unauthorized access to networks and data. The Sniffing and Spoofing with Kali Linux course can help build a foundation for a career as a Network Security Engineer by providing you with the skills to identify and mitigate security risks.
Information Security Analyst
An Information Security Analyst plans and implements security measures to protect an organization's computer systems and networks. They analyze security risks, develop security policies, and implement security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course can provide you with the skills to identify and mitigate security risks, making it a valuable asset for a career as an Information Security Analyst.
Security Consultant
A Security Consultant provides guidance and support to organizations on how to improve their security posture. They assess security risks, develop security plans, and implement security controls. The Sniffing and Spoofing with Kali Linux course can help you develop the skills to identify and mitigate security risks, making it a valuable asset for a career as a Security Consultant.
Penetration Tester
A Penetration Tester is responsible for identifying and exploiting vulnerabilities in computer systems and networks. They assess security risks, develop security plans, and implement security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course can provide you with the skills to identify and exploit vulnerabilities, making it a valuable asset for a career as a Penetration Tester.
Computer Forensic Analyst
A Computer Forensic Analyst investigates computer crimes and provides expert testimony in court. They analyze digital evidence, identify and exploit vulnerabilities, and develop security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course can provide you with the skills to identify and exploit vulnerabilities, making it a valuable asset for a career as a Computer Forensic Analyst.
Incident Responder
An Incident Responder is responsible for responding to and mitigating security incidents. They analyze security logs, identify and exploit vulnerabilities, and develop security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course can provide you with the skills to identify and exploit vulnerabilities, making it a valuable asset for a career as an Incident Responder.
Vulnerability Manager
A Vulnerability Manager is responsible for identifying and managing vulnerabilities in computer systems and networks. They assess security risks, develop security plans, and implement security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course can provide you with the skills to identify and exploit vulnerabilities, making it a valuable asset for a career as a Vulnerability Manager.
Security Architect
A Security Architect designs and implements security solutions for organizations. They assess security risks, develop security plans, and implement security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course may provide you with some of the skills to identify and mitigate security risks, making it a helpful asset for a career as a Security Architect.
Cybersecurity Analyst
A Cybersecurity Analyst analyzes security threats and develops security measures to protect computer networks. They assess security risks, develop security plans, and implement security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course may provide you with some of the skills to identify and mitigate security risks, making it a helpful asset for a career as a Cybersecurity Analyst.
IT Security Manager
An IT Security Manager is responsible for managing the security of an organization's computer systems and networks. They assess security risks, develop security plans, and implement security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course may provide you with some of the skills to identify and mitigate security risks, making it a helpful asset for a career as an IT Security Manager.
Network Administrator
A Network Administrator is responsible for managing and maintaining computer networks. They assess security risks, develop security plans, and implement security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course may provide you with some of the skills to identify and mitigate security risks, making it a helpful asset for a career as a Network Administrator.
Systems Administrator
A Systems Administrator is responsible for managing and maintaining computer systems. They assess security risks, develop security plans, and implement security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course may provide you with some of the skills to identify and mitigate security risks, making it a helpful asset for a career as a Systems Administrator.
Software Engineer
A Software Engineer designs, develops, and maintains software applications. They assess security risks, develop security plans, and implement security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course may provide you with some of the skills to identify and mitigate security risks, making it a helpful asset for a career as a Software Engineer.
Web Developer
A Web Developer designs and develops websites. They assess security risks, develop security plans, and implement security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course may provide you with some of the skills to identify and mitigate security risks, making it a helpful asset for a career as a Web Developer.
Database Administrator
A Database Administrator is responsible for managing and maintaining databases. They assess security risks, develop security plans, and implement security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course may provide you with some of the skills to identify and mitigate security risks, making it a helpful asset for a career as a Database Administrator.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Sniffing and Spoofing with Kali Linux.
This classic text provides essential principles for security engineering, foundational and valuable knowledge for security professionals and those interested in securing their digital lives.
Focuses more on ethical hacking and defense, providing more depth into the concepts and mechanisms covered in this course.
This classic reference networking book can provide valuable background information on the network protocols and concepts that underlie the techniques and tools used in this course.
Covers a wider range of security tools and applications than this course, which may be valuable for more advanced students and those interested in learning outside the scope of the course.
Provides basic information on the topic of network security and some of the tools leveraged in this course.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Sniffing and Spoofing with Kali Linux.
Ethical Hacking: Sniffing
Most relevant
Internet Security: A Hands-on Approach
Most relevant
Defense Evasion with ProxyChains
Most relevant
Packet Sniffing with Wireshark: Create Your First Filters
Most relevant
Post Exploitation with Kali Linux
Most relevant
Analyze Network Traffic with TCPDump
Most relevant
Attacks and Exploits: Network and Application Attacks for...
Most relevant
Threat Intelligence with MSTICPy
Most relevant
Persistence with pwncat
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser