Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Disabling Unnecessary Services
Flood Ping
Sniffing
- Sniffit
- Ettercap
- Tcpdump
Network Monitoring
- Port scanning using tools such as Nmap and Nessus
- LAN traffic monitoring with iptraf
- Tracking changes in Ethernet network interface cards and IP addresses assigned to users (arpwatch)
- Network traffic dumping via tcpdump
Packet Logging
- Logging packets using NetFilter and iptables mechanisms
- IP Protocol Logger (ippl)
Firewall Configuration (Based on NetFilter and iptables)
- Understanding packet flow through filters
- Creating custom chain rules
Proxies
- WWW Proxy servers using Squid
Cryptography
- SSLwrap
- SSH and SCP
- SSH Tunnelling
Spoofing
- Gathering information about the owner of an IP address or domain
- Reporting legal breaches to relevant authorities
Requirements
A foundational understanding of Unix-like operating systems and the basic architecture of TCP/IP networks is required.
14 Hours
Testimonials (3)
experienced trainer
Monika Biskupska - Osrodek Przetwarzania Informacji - Panstwowy Instytut Badawczy
Course - Kubernetes Security Fundamentals (LFS460)
trainer has hands-on knowledge
- Osrodek Przetwarzania Informacji - Panstwowy Instytut Badawczy
Course - Kubernetes for App Developers (LFD459)
Labs and hands on