Network Security Monitoring
Learn about key fundamentals of Network Security, the importance of monitoring network perimeters and how to analyse the network traffic and logs for the footprints of potential network based attacks like MITM, network discovery and data exfiltration.
This module explores various aspects of network security, focuses on monitoring the network perimeters for the indicators of various attacks on the network. It covers detailed hands-on exercises to examine the network traffic and logs to investigate whether the attacker is actively probing the network endpoints, performing man-in-the-middle attacks, or attempting to exfiltrate the data through various network channels.
0%
Network Security Essentials
Learn about key aspects of network security essentials and how to monitor and protect against adversaries.
0%
Network Discovery Detection
Understand how attackers discover assets in a network, and how to detect that activity.
0%
Data Exfiltration Detection
Learn how to detect data exfiltration attempts in various network channels.
0%
Man-in-the-Middle Detection
Learn what MITM attack is, and how to identify the footprints of this attack in the network traffic.
0%
IDS Fundamentals
Learn the fundamentals of IDS, along with the experience of working with Snort.
0%
Snort
Learn how to use Snort to detect real-time threats, analyse recorded traffic files and identify anomalies.
What are modules?
A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).
