Network Research
Embark on a comprehensive journey to explore information security fundamentals using Linux. Learn how to leverage virtualization, networking protocols, and cybersecurity techniques to strengthen your network defense skills. This program equips you with hands-on experience in network scanning, attack analysis, and defense strategies, preparing you for real-world cybersecurity challenges.
Program Code: NX201
Package: NX Defense​
Level: 2



Course Information

Prerequisites
-
Basic Computer Skills​
-
Basic Networking Knowledge

Duration Options
-
Self-paced: 4-8 week
-
Trainer-led: 40 hours
Core Features of Cyberium Arena
Labs
Enhance training with defense and attack tasks.
Books
Tailored coursebooks for cybersecurity studies.
Scenarios
Diverse situations mimicking real professional challenges.
Projects
Integrated projects to demonstrate acquired knowledge.
Course Overview
Network Foundations
Understanding protocols, architecture, and network communication principles
Security Analysis
Learn scanning techniques, traffic analysis, and network monitoring tools

Linux Fundamentals
Master essential Linux commands and system architecture for security operations
Attack Methods
Study common attack vectors, payload creation, and exploitation techniques
Defense Strategies
Implement firewall configurations and develop robust security measures
Introduction to Linux

Virtualization Basics
Learn about virtualization and Linux distributions. Install Linux and configure VMWare.
Linux Administration
Explore directory structures, user management, and package handling in Linux.
Scripting and Automation
Master file manipulation commands and Linux scripting for automation tasks.

Networking Fundamentals

TCP/IP Model
Understand the layers and protocols of the TCP/IP networking model.

DNS and DHCP
Learn about Domain Name System and Dynamic Host Configuration Protocol.

Network Services
Explore SSH, FTP, and Apache web server functionalities.
Network Scanning Techniques
Nmap
Master Nmap for comprehensive network scanning and discovery.
Masscan
Learn to use Masscan for rapid Internet-scale network scanning.
Brute Force
Understand brute force attack strategies and their applications.
Offline Attacks
Explore offline attack methods and creating effective wordlists.


Wireshark and Network Analysis
Packet Capture
Learn to capture and analyze network traffic using Wireshark.
Filtering Techniques
Master advanced filtering to isolate specific network packets.
Object Extraction
Extract objects from captured network traffic for further analysis.
Network Attack Strategies



Man-in-the-Middle
Understand MitM attack techniques and their implications.
ARP Poisoning
Learn about Address Resolution Protocol poisoning and its effects.
Service Brute-Force
Explore methods to brute-force network services and their vulnerabilities.

Payload Creation and Exploitation
1
Reverse Payloads
Create and understand reverse connection payloads.
2
Bind Payloads
Develop bind payloads for specific attack scenarios.
3
Metasploit Framework
Master Msfvenom and Msfconsole for advanced exploitation techniques.