Get in Touch

Course Outline

Disabling Unnecessary Services

Flood Ping

Sniffing

  • Sniffit
  • Ettercap
  • Tcpdump

Network Monitoring

  • Port scanning using tools such as Nmap and Nessus
  • LAN traffic monitoring with iptraf
  • Tracking changes in Ethernet network interface cards and IP addresses assigned to users (arpwatch)
  • Network traffic dumping via tcpdump

Packet Logging

  • Logging packets using NetFilter and iptables mechanisms
  • IP Protocol Logger (ippl)

Firewall Configuration (Based on NetFilter and iptables)

  • Understanding packet flow through filters
  • Creating custom chain rules

Proxies

  • WWW Proxy servers using Squid

Cryptography

  • SSLwrap
  • SSH and SCP
  • SSH Tunnelling

Spoofing

  • Gathering information about the owner of an IP address or domain
  • Reporting legal breaches to relevant authorities

Requirements

A foundational understanding of Unix-like operating systems and the basic architecture of TCP/IP networks is required.

 14 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories