In this course, you'll learn to set up your Kali Linux 2.0 lab, understand device communication, and master Man in the Middle (MITM) attacks. The course has four sections:
Recommended experience
What you'll learn
Identify and list the steps to set up a Kali Linux environment.
Utilize various Kali Linux tools for different cybersecurity tasks.
Examine and explain the process and implications of ARP poisoning.
Design and execute a Man in the Middle attack on a target network.
Skills you'll gain
Details to know
Add to your LinkedIn profile
September 2024
3 assignments
See how employees at top companies are mastering in-demand skills
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 6 modules in this course
In this module, we will welcome you to the course, providing an overview of what to expect. This brief introduction sets the stage for your learning journey into MITM attacks, ensuring you are aware of the course objectives and the skills you will acquire.
What's included
1 video
In this module, we will guide you through the essential setup of your working environment. From installing Kali Linux on various platforms to configuring network settings and enhancing performance, you'll be fully prepared to dive into MITM attacks.
What's included
8 videos
In this module, we will cover fundamental networking concepts essential for understanding MITM attacks. You'll learn about MAC addresses, their function, and how spoofing them can bypass certain security measures.
What's included
2 videos1 assignment
In this module, we will dive deep into the practical aspects of performing MITM attacks. From gathering detailed information about connected clients to capturing login credentials and injecting malicious content, you'll gain hands-on experience in executing these attacks.
What's included
16 videos
In this module, we will explore advanced hacking techniques targeting connected clients. You'll learn how to create undetectable backdoors, deploy fake updates, and interact with compromised systems, enhancing your practical hacking skills.
What's included
5 videos
In this module, we will focus on detection and security measures to protect against MITM attacks. You'll learn how to detect ARP poisoning, secure your ARP tables, and eliminate malicious Meterpreter sessions, ensuring robust defense mechanisms for your systems.
What's included
4 videos2 assignments
Instructor
Offered by
Recommended if you're interested in Computer Security and Networks
Johns Hopkins University
LearnKartS
Johns Hopkins University
Why people choose Coursera for their career
New to Computer Security and Networks? Start here.
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.