Back to all modules

Network Security Monitoring

Network Security Monitoring icon

Learn about key fundamentals of Network Security, the importance of monitoring network perimeters and how to analyse the network traffic and logs for the footprints of potential network based attacks like MITM, network discovery and data exfiltration.

This module explores various aspects of network security, focuses on monitoring the network perimeters for the indicators of various attacks on the network. It covers detailed hands-on exercises to examine the network traffic and logs to investigate whether the attacker is actively probing the network endpoints, performing man-in-the-middle attacks, or attempting to exfiltrate the data through various network channels.

Network Security Monitoring icon

We use cookies to ensure you get the best user experience. For more information contact us.

Read more