Skip to main contentSkip to main content
The Red Raffle banner icon.

The Jr Pentester Path just got rebuilt. Complete rooms, earn tickets, and win a free PT1 cert.

Feature
BLOG • 6 min read

How to Learn Network Security Monitoring With Hands-On Labs

Network traffic does not lie. Every connection, every DNS query, every lateral movement attempt leaves a trace. Network Security Monitoring is the practice of collecting, analysing, and acting on that data to detect threats before they become breaches.

It is also one of the most practical skill sets a SOC analyst or blue teamer can build. Unlike some security disciplines that require expensive lab environments or specialist hardware, NSM can be practised from day one with free, open-source tools on a standard laptop. The best NSM tools, including Wireshark, Zeek, and Suricata, are free and together provide enterprise-level security visibility. Here is how to actually learn it.


What Is Network Security Monitoring and Why Does It Matter?

Network Security Monitoring is the practice of collecting and analysing network data to detect threats, suspicious activity, and security incidents. It gives security teams visibility into what is moving across their network at all times: packets, host activity, DNS queries, files, signatures, anomalies, and connection metadata.

The reason it matters is simple. Endpoint detection catches threats on individual machines. NSM catches threats in the space between them. Lateral movement, command and control beaconing, data exfiltration, and network-based exploitation all generate network-layer evidence that endpoint tools do not see. Without NSM, that evidence disappears.

Today, organisations deploy network sensors across on-premises, cloud, and hybrid environments, integrating NSM with IDS/IPS systems, SIEM platforms, and AI-driven analytics that identify anomalies automatically. The skill set is not niche. It is foundational SOC analyst work.


What Are the Core NSM Concepts You Need to Understand First?

Before picking up tools, get these concepts clear. They are the mental models that make everything else interpretable.

Traffic metadata versus full packet capture. Full packet capture records every byte of every packet: powerful but storage-intensive. Traffic metadata records connection information, protocols, durations, and bytes transferred without storing payload content. Most SOC environments use a combination: metadata for everything, full capture triggered on specific conditions. Knowing which you are working with changes how you interpret what you see.

Signatures versus anomalies. Signature-based detection matches traffic against known bad patterns. Fast and precise for known threats, blind to anything novel. Anomaly-based detection identifies deviations from established baselines. Catches novel threats but generates more false positives. Real NSM programmes use both.

The data sources that feed NSM. PCAP files are full packet captures. NetFlow and IPFIX are metadata records of network connections. Zeek logs are structured connection and protocol logs. IDS alerts from Suricata or Snort are event-driven detections. Each tells you something different. Proficiency in NSM means knowing which source to query for which type of question.


Which Tools Do NSM Practitioners Actually Use?

Tool Type What it does What it produces Cost Practise on TryHackMe
Wireshark Packet analyser Captures and dissects network traffic at packet level. Decodes protocols, reconstructs sessions, filters on any field. PCAP files, protocol decode, stream reassembly Free SOC Level 1 path
Zeek Network analysis framework Generates structured logs from live traffic or PCAP. Tracks connections, DNS, HTTP, SSL, files, and more per session. Structured JSON logs by protocol: conn.log, dns.log, http.log, ssl.log, files.log Free, open-source SOC Level 1 path
Suricata IDS/IPS/NSM engine Signature and anomaly-based detection at wire speed. Supports IDS, IPS, and NSM modes. Inspects HTTP, DNS, SMB, TLS, and more. EVE JSON alerts, flow logs, protocol metadata. SIEM-ready output. Free, open-source SOC Level 1 path
Snort IDS/IPS The original open-source intrusion detection system. Signature-based detection with a large community ruleset. Widely deployed in enterprise and government environments. Alerts matched against signature rules Free, open-source SOC Level 1 path
Security Onion Full NSM platform Bundles Zeek, Suricata, Elasticsearch, and Kibana into a single deployable Linux OS. Full-stack NSM without manual integration work. Unified dashboard across all integrated tools Free, open-source Home lab deployment
Splunk / Sentinel SIEM Ingests NSM tool output alongside other log sources. Correlates events, runs detection rules, surfaces alerts for analyst triage. Correlated alerts, dashboards, investigation timelines Free tier available SOC Level 1 path

All open-source tools listed are free to download and use. TryHackMe rooms provide pre-configured lab environments so you can practise without local setup.


How Do You Build NSM Skills With Hands-On Practice?

Reading about network traffic analysis does not teach you to analyse network traffic. The skill only develops through repeated exposure to real data, real tools, and real attack patterns. Here is how to build it systematically.

Start with Wireshark on real PCAPs. Open a PCAP file, pick a protocol, and follow a conversation from start to finish. The goal is not to find the bad thing immediately. It is to develop an intuition for what normal looks like so abnormal is recognisable. Malware-traffic-analysis.net provides PCAP files from real malware infections with associated writeups. Every file is a practise investigation.

Learn Zeek logs before you learn Zeek commands. Zeek's value is in its structured log output. Conn.log, dns.log, http.log, ssl.log: each captures a different dimension of network behaviour. Understanding what each log records, and what questions you can answer from it, is the skill. Start by reading Zeek logs from a PCAP rather than configuring Zeek to capture live traffic. The analytical skill is the same and the setup overhead is zero.

Write Suricata rules, not just read them. Signature writing is where NSM understanding deepens. A rule that fires on every HTTP request is useless. A rule that fires on HTTP requests to a specific URI containing a specific pattern, from a specific subnet, during business hours, is useful. Understanding the constraints that make a rule precise is what separates NSM analysts from NSM tool operators.

TryHackMe's SOC Level 1 path covers Wireshark, Zeek, Snort, and Splunk in dedicated guided rooms with real lab environments. You are not reading about these tools. You are using them on real traffic data in a browser-based environment with no local setup required. The network security monitoring content in the path is the most structured introduction to the full NSM tool stack available on any learning platform.


How Do You Build a Home NSM Lab?

A home lab is where guided practice becomes independent investigation. Security Onion bundles Zeek, Suricata, and the Elastic Stack into a single distributable Linux OS, making full-stack NSM deployment straightforward on a dedicated machine or a VM with 16GB of RAM.

The basic setup: install Security Onion on a VM, configure it to monitor traffic from a second VM running a vulnerable target (Metasploitable or DVWA work well), and generate traffic by attacking the target. Then investigate that traffic in Security Onion. Every attack you run is a learning opportunity from both sides of the network: attacker and defender simultaneously.

The alternative for those without hardware: TryHackMe's guided rooms provide pre-configured NSM environments in-browser. You get the investigation experience without the infrastructure overhead.


What Should You Investigate to Build Real Skill?

The scenario types that build NSM skill fastest are also the most common in SOC environments.

DNS-based attacks. High query volumes, long subdomain strings, unusual TLDs, domain generation algorithm (DGA) traffic: all visible in Zeek dns.log and Suricata alerts. DNS is one of the most information-rich data sources in NSM and one of the most commonly abused.

Command and control beaconing. Regular outbound connections to the same destination at fixed intervals. Visible in Zeek conn.log as repeated sessions with consistent byte counts and timing. Low and slow enough to evade most threshold-based alerts. Training your eye to spot beaconing in connection metadata is a genuinely useful analytical skill.

Lateral movement. SMB connections between internal hosts, NTLM authentication attempts, RDP sessions from unusual sources. All visible in Zeek and Suricata logs, correlatable with SIEM detection rules. The ability to reconstruct lateral movement from network evidence is a core DFIR and NSM skill.

Data exfiltration. Unusually large outbound transfers, DNS tunnelling, HTTPS to unusual destinations. Visible in flow data and Zeek conn.log by examining destination bytes and connection durations.


Where Do You Start?

Open TryHackMe's SOC Level 1 path. The network security monitoring content gives you guided, hands-on practice with Wireshark, Zeek, Snort, and Splunk in live lab environments. No setup. No configuration. Just open your browser and start investigating.

Then go deeper with real PCAPs from malware-traffic-analysis.net. Write your first Suricata rule. Set up Security Onion at home. Every session with real traffic data builds the pattern recognition that makes you genuinely useful in a SOC.

The network does not lie. Learn to read it.

authorNick O'Grady
May 21, 2026

Recommended

Get more insights, news, and assorted awesomeness around cyber training.

Join over 640 organisations upskilling their
workforce with TryHackMe