0

Loading ...

Course / Course Details

INTRODUCTION TO MITM

  • Ruth Fatayo image

    By - Ruth Fatayo

  • 14 students
  • N/A
  • (0)

Course Requirements

  • 1. Basic knowledge of networking concepts (e.g., IP addresses, DNS, and protocols).
  • 2. Familiarity with cybersecurity fundamentals (optional but beneficial).
  • 3. Access to a virtual environment for hands-on labs (e.g., VirtualBox, VMware).
  • 4. Curiosity about cybersecurity threats and defensive strategies.
  • Course Description

    This course introduces participants to the concept of Man-in-the-Middle (MITM) attacks, a common cyberattack technique where attackers intercept and manipulate communication between two parties. The course covers the fundamentals of how MITM attacks work, the tools and methods used, and the vulnerabilities exploited. 

    Course Outcomes

    By the end of the course, participants will be able to:

    1. Explain the concept and types of MITM attacks (e.g., ARP spoofing, DNS spoofing, SSL stripping).
    2. Understand the tools and techniques used to execute MITM attacks.
    3. Identify potential vulnerabilities in communication channels that may lead to MITM attacks.
    4. Detect signs of MITM activity using network monitoring and analysis tools.

    Course Curriculum

    • 7 chapters
    • 42 lectures
    • 6 quizzes
    • N/A total length
    Toggle all chapters
    1 Section 1. 0: Module Objective
    N/A


    2 SECTION 1.1: MITM
    N/A


    3 SECTION 1.2: Passive vs Active MITM
    N/A


    4 SECTION 1.3: Effects of MiTM
    N/A


    5 SECTION 1.4: How the course is structured from here!
    N/A


    6 Introduction to MITM LAB 1
    N/A


    7 MITMA Quiz 1 [Quiz]
    10 Min


    1 SECTION 2.0: MODULE OBJECTIVE
    N/A


    2 SECTION 2.1: OSI Layer 1 and OSI Layer 2
    N/A


    3 OSI LAYER EXPLAINED
    N/A


    4 SECTION 2.2: MITM on the physical layer
    N/A


    5 SECTION 2.3: MITM on the data link layer
    N/A


    6 MAC poisoning
    N/A


    7 Extra Lab demo
    N/A


    8 MITMA Quiz 2 [Quiz]
    10 Min


    9 Introduction to MITM LAB 2
    N/A


    1 SECTION 3.0 Module Objective
    N/A


    2 SECTION 3.1: OSI Layer 3 and OSI Layer 4
    N/A


    3 SECTION 3.2: MITM on the network layer
    N/A


    4 SECTION 3.3: MITM on the transport layer
    N/A


    5 MAC and IP spoofing
    N/A


    6 Introduction to MITM LAB 3
    N/A


    7 MITMA Quiz 3 [Quiz]
    10 Min


    1 SECTION 4.0 Module Objective
    N/A


    2 SECTION 4.1 OSI Layer 5
    N/A


    3 The Session layer
    N/A


    4 SECTION 4.2 MITM on the session layer
    N/A


    5 Extra read for side hijacking
    N/A


    6 Case Study from lifars
    N/A


    7 MITMA Quiz 4 [Quiz]
    10 Min


    8 Introduction to MITM LAB 4
    N/A


    1 SECTION 5.0 Module Objective
    N/A


    2 SECTION 5.1: OSI Layer 6 and OSI Layer 7
    N/A


    3 SECTION 5.2: MITM on the presentation layer
    N/A


    4 SECTION 5.3: MITM on the application layer
    N/A


    5 For a better read
    N/A


    6 Introduction to MITM LAB 5
    N/A


    7 MITMA Quiz 5 [Quiz]
    10 Min


    1 Final Assessment [Quiz]
    10 Min


    2 SECTION 6.2: WHAT NEXT?
    N/A


    3 SECTION 6.1: LAW AND ETHICS
    N/A


    1 References
    N/A


    1. LAB 1
    2. LAB 2
    3. LAB 3
    4. LAB 4

    Instructor

    0 Rating
    0 Reviews
    87 Students
    2 Courses

    Course Full Rating

    0

    Course Rating
    (0)
    (0)
    (0)
    (0)
    (0)

    No Review found

    Sign In or Sign Up as student to post a review

    Student Feedback

    Course you might like

    Beginner
    Starting and Building a Career in Cyber Security
    0 (0 Rating)
    The primary goal of this quick start guide is to introduce you to cybersecurity and how to build a successful career. Th...
    Beginner
    Certified Secure Computer User (CSCU) - Int'l Certification Inclusive
    5 (2 Rating)
    The purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect th...

    You must be enrolled to ask a question

    Students also bought

    More Courses by Author

    Discover Additional Learning Opportunities