Description
Large and small companies face a critical stage; cyber-attacks have transformed
dramatically over the past few years. Unfortunately, organizations are still being breached too
often and are under more pressure than ever to secure their systems. The Network Security
course aims to address cyber challenges eHperienced on the network level. The course covers
various attack techniques and how to defend against them.
The course sets the groundwork for later specialization in cyber forensics, advanced cyber defense,
and penetration testing.
The course helps prepare for the certification eHams Linux+ (CompTlA) and LPIC-2 (LPI).
Target Audience
Objectives
- Becoming familiar with the cyber threat landscapes
- Acquiring the knowledge and tools to recognize threats in the network
- Understanding cyber-attacks
- Becoming familiar with a variety of available tools for performing security-related tasks
Module 1: Introduction to Linux
Students will study the Linux 05 fundamentals. This module uses Linux commands,
manipulating teHt and command outputs, understanding terminal-emulators, permissions, and other
security concepts.
Virtualization
- Introduction to Virtualization
- About Linux Distro
- Installing Linux
- Working with VMWare
- Bridged vs. NAT
Working with Linux
- Linux Directories
- Linux Users
- Packages
- File Manipulation Commands
- Text and File Manipulation Technics
- Writing Linux Sripts
Module 2: Networking
During this module, participants will study network infrastructures, common network types, network Layers, communication between protocols, communication between network
devices from different Layers, and network anonymity methods.
Protocols and Services
- TCP/IP and OSI Model
- Network Routing Basics
- DNS
- DHCP
- ARP
- Remote Connection Protocols
Wireshark — Diving into Packets
- Non-Secure and Secure Packets
- Filtering and Parsing
- Extracting Objects and Files from PCAP Files
Module 3: Introduction to Network Forensics
Windows Tools
- NetworkMiner
- Advanced Wireshark
- OS-Fingerprinting
- Detecting Suspicious Traffic
- Sysinternals
Linux Tools
- TShark – Network Analyzing Automation
- Capture Packet Data from Live Network
- Filter Packets from Live Network
- Filter Packet from PCAP File
- Traffic Statistics
- File-Carving
- Parsing Traffic Logs
- CAPlnfo
Module 4: Cyber Security
Cyber Security Vectors
- Anti-Viruses
- DoS and DDoS
- CNC Servers and Botnets
- Steganography
Network Attacks
- Scanning Methods
- MiTM
- ARP Poisoning
- DHCP Starvation
- LLMNR Attacks
- Offline Password Brute-Force
- Working with Responder
Cyber Attack Practice
- Payloads: Reverse vs.
- Bind Privilege Escalation