Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Disabling Unnecessary Services
Flood Ping Techniques
Packet Sniffing
- Sniffit
- Ettercap
- Tcpdump
Network Monitoring
- Port scanning using tools like nmap and Nessus
- LAN traffic analysis with iptraf
- Monitoring Ethernet interface and IP address changes via arpwatch
- Traffic dumping with tcpdump
Packet Logging
- Logging packet data using NetFilters and iptables mechanisms
- Utilizing the IP Protocols Logger (ippl)
Firewall Configuration (Based on NetFilters and iptables)
- Understanding packet traversal through filter chains
- Creating custom firewall chains
Proxy Servers
- Web proxy configuration with Squid
Cryptography and Encryption
- SSLwrap
- SSH and SCP for secure file transfer and remote access
- SSH tunneling techniques
Spoofing and Attribution
- Gathering information regarding IP address and domain ownership
- Procedures for reporting legal breaches to relevant authorities
Requirements
Familiarity with Unix-like operating systems and a foundational understanding of TCP/IP network architecture.
14 Hours
Testimonials (3)
experienced trainer
Monika Biskupska - Osrodek Przetwarzania Informacji - Panstwowy Instytut Badawczy
Course - Kubernetes Security Fundamentals (LFS460)
trainer has hands-on knowledge
- Osrodek Przetwarzania Informacji - Panstwowy Instytut Badawczy
Course - Kubernetes for App Developers (LFD459)
Labs and hands on