1 00:00:00,330 --> 00:00:05,160 Hello and welcome to the network and layer two attacks and countermeasures course. 2 00:00:06,790 --> 00:00:12,850 Now, throughout the course, we're going to learn the following topics first will prepare the lab environment 3 00:00:12,850 --> 00:00:14,390 for hands on experiments. 4 00:00:14,770 --> 00:00:19,810 Second, we'll learn how to sniff the network and gather information from the network. 5 00:00:20,650 --> 00:00:24,040 We're going to use some tools such as TCP Dump and Wireshark. 6 00:00:24,190 --> 00:00:29,170 Then we'll see some attacks and techniques to expand the sniffing service. 7 00:00:29,980 --> 00:00:37,480 Mac address table overflow attack, also known as Mac Flooding AARP cash poisoning attack, also known 8 00:00:37,480 --> 00:00:39,070 as AARP spoof. 9 00:00:40,320 --> 00:00:47,040 DHP Starvation Attack and DHP spoof and villain hopping techniques. 10 00:00:48,310 --> 00:00:55,780 The next topic is what else can be done on networked devices in penetration tests, gathering information, 11 00:00:55,780 --> 00:01:03,460 cracking passwords of the communication channels, compromising as an MP, etc., and finally will check 12 00:01:03,460 --> 00:01:10,510 the configurations of the network devices, the password creation methods, identity management, access 13 00:01:10,510 --> 00:01:12,550 control list, port security. 14 00:01:12,550 --> 00:01:14,830 And the list goes on you with me.