Network Research

R11,999.00

Companies large and small face a critical stage, cyber-attacks have transformed dramatically over the past few years. Unfortunately, organizations are still being breached too often and are under more pressure than ever to secure their systems. The Network Security course aims to address cyber challenges experienced on the network level. The course covers various attack techniques and how to defend against them.

By the end of the course, participants will have the ability to build and maintain a secure network, protect data, manage vulnerabilities, implement active access control measures, and regularly monitor the network for inconsistencies.

The course sets the groundwork for later specialization in cyber forensics, advanced cyber defense and penetrating testing.

Duration: 40 Hours

Target Audience
The course targets participants with basic knowledge in IT or networking, who wish to understand corporate cybersecurity and cyber defense on a technical perspective.

  • IT security personnel
  • Incident responders
  • Security analysts

Pre-requisites

  • None

Objectives

  • Becoming familiar with the cyber threat landscapes
  • Acquiring the knowledge and tools to recognize threats in the network.
  • Testing networks and network-based-systems for vulnerabilities.
  • Understanding cyber-attacks.
  • Becoming familiar with a variety of available tools for performing security-related tasks.
Category:

Description

Module 1: Introduction to Linux

During this module, students will study the fundamentals of the Linux OS – How to use basic commands, manipulation of text and command outputs, understanding the Terminal-Emulator, permissions, and other security concepts.

  • Virtualization
    o Introduction to Virtualization
    o About Linux Distro
    o Installing Linux
    o Working with VMWare
    o Bridged vs. NAT
  • Working with Linux
    o Linux Directories
    o Linux Users
    o Packages
  • Packages Commands
  • Updating
  • Installing and Managing
    o File Manipulation Commands
    o Text and File Manipulation Technics
    o Writing Linux Scripts
  • Permissions
  • Variables
  • Conditions
  • Loops
  • Automation

Module 2: Networking

During this module, participants will study the basics of network infrastructures, common network types, network Layers, and communications between protocols, communication between network devices from different Layers, and network anonymity methods.

  • Protocols and Services
    o TCP/IP and OSI Model
  • Network Routing Basics
    o DNS
    o DHCP
    o ARP
    o Remote connection Protocols
    o Important Protocols
  • Wireshark – Diving into Packets
    o Non-Secure and Secure Packets
    o Filtering and parsing
    o Extracting Objects and Files from PCAP Files

Module 3: Introduction to Network Forensics

Large organizations these days suffer greatly from network attacks and malicious intrusions. Those who manage the organization’s network have an immense impact on ensuring its safety. This module will introduce participants to Network Forensics and will learn the ability to locate and better understand various attacks.

  • Windows Tools
    o Advanced Wireshark
  • OS-Fingerprinting
  • Detecting Suspicious Traffic
  • GeoIP Mapping
    o NetworkMiner
    o Sysinternals
  • Procmon
  • TCPview
  • Linux Tools
    o TShark – Network Analyzing Automation
  • Capture Packet Data from Live Network
  • Filter Packets from Live Network
  • Filter Packet from PCAP File
  • Traffic Statistics
  • Automating Network Capture and Filtering
  • File-Carving
    o Zeek Tools: Bro and Bro-Cut
  • Extracting Information
  • Parsing Traffic Logs
    o CAPInfo

Module 4: Cyber Security

The primary goal of this module is teaching participants to embrace the attacker state-of-mind to recognize the necessary defense mechanisms. Participants will deal with several types of attacks. Students will learn about hash functions; furthermore, they will learn how wireless networks are attacked and how the organization as vulnerable to those attacks. Social engineering and honeypot techniques will also be demonstrated.

  • Cyber Security Vectors
    o Anti-Viruses
    o Firewalls and FWNG
    o DoS and DDoS
    o CNC Servers and Botnets
    o Wireless Attack Concepts
  • Handshake Based Authorization
  • Deauthentication Attacks MiTM
  • Evil-Twin
    o Steganography
  • Network Attacks
    o Introduction to Scanning
    o Scanning Methods in Nmap
    o Scanning with Shodan
    o MiTM
    o ARP poisoning
  • DNS Spoofing
    o DHCP Starvation
    o LLMNR Attacks
  • Offline Password Brute-Force
  • Working with Responder
  • Cyber Attack Practice
    o Backdooring
  • Payloads: Reverse vs. Bind
  • Multi-Handler
    o Privilege Escalation