top of page

Network Research

Embark on a comprehensive journey to explore information security fundamentals using Linux. Learn how to leverage virtualization, networking protocols, and cybersecurity techniques to strengthen your network defense skills. This program equips you with hands-on experience in network scanning, attack analysis, and defense strategies, preparing you for real-world cybersecurity challenges.

Program Code:  NX201

Package:  NX Defense​

Level:  2

nx.png
NX201-Network-Research.jpg
image.png

Course Information

image.png

Prerequisites

  • Basic Computer Skills​

  • Basic Networking Knowledge

image.png

Duration Options

  • Self-paced: 4-8 week

  • Trainer-led: 40 hours

Core Features of Cyberium Arena

Labs

Enhance training with defense and attack tasks.

Books

Tailored coursebooks for cybersecurity studies.

Scenarios

Diverse situations mimicking real professional challenges.

Projects

Integrated projects to demonstrate acquired knowledge.

Course Overview

Network Foundations

Understanding protocols, architecture, and network communication principles

Security Analysis

Learn scanning techniques, traffic analysis, and network monitoring tools

image.png

Linux Fundamentals

Master essential Linux commands and system architecture for security operations

Attack Methods

Study common attack vectors, payload creation, and exploitation techniques

Defense Strategies

Implement firewall configurations and develop robust security measures

Introduction to Linux

image.png

Virtualization Basics

Learn about virtualization and Linux distributions. Install Linux and configure VMWare.

Linux Administration

Explore directory structures, user management, and package handling in Linux.

Scripting and Automation

Master file manipulation commands and Linux scripting for automation tasks.

image.png

Networking Fundamentals

image.png

TCP/IP Model

Understand the layers and protocols of the TCP/IP networking model.

image.png

DNS and DHCP

Learn about Domain Name System and Dynamic Host Configuration Protocol.

image.png

Network Services

Explore SSH, FTP, and Apache web server functionalities.

Network Scanning Techniques

Nmap

Master Nmap for comprehensive network scanning and discovery.

Masscan

Learn to use Masscan for rapid Internet-scale network scanning.

Brute Force

Understand brute force attack strategies and their applications.

Offline Attacks

Explore offline attack methods and creating effective wordlists.

image.png
image.png

Wireshark and Network Analysis

Packet Capture

Learn to capture and analyze network traffic using Wireshark.

Filtering Techniques

Master advanced filtering to isolate specific network packets.

Object Extraction

Extract objects from captured network traffic for further analysis.

Network Attack Strategies

image.png
image.png
image.png

Man-in-the-Middle

Understand MitM attack techniques and their implications.

ARP Poisoning

Learn about Address Resolution Protocol poisoning and its effects.

Service Brute-Force

Explore methods to brute-force network services and their vulnerabilities.

image.png

Payload Creation and Exploitation

1

Reverse Payloads

Create and understand reverse connection payloads.

2

Bind Payloads

Develop bind payloads for specific attack scenarios.

3

Metasploit Framework

Master Msfvenom and Msfconsole for advanced exploitation techniques.

image.png

Firewall Operations and Security

Firewall Basics

Understanding firewall operation and configuration

Port Blocking

Techniques for effectively blocking ports

Device Monitoring

Methods for monitoring network devices

Branch in Spain:

Sabadell (Barcelona), Spain

+34 930.289.919 

Branch in Israel:

Moshe Aviv Tower, Ramat Gan

+972.3.9629018

Follow Us On:

  • LinkedIn
  • Facebook

© 2024 by ThinkCyber

bottom of page