Get in Touch

Course Outline

Disabling Unnecessary Services

Flood Ping Attacks

Packet Sniffing

  • Sniffit
  • Ettercap
  • Tcpdump

Network Monitoring

  • Port scanning using tools such as Nmap and Nessus
  • Monitoring LAN traffic with iptraf
  • Tracking changes to Ethernet network interfaces and IP addresses assigned to users via arpwatch
  • Capturing and analysing network traffic using tcpdump

Packet Logging

  • Logging packets using NetFilter and iptables mechanisms
  • Utilising the IP Protocols Logger (ippl)

Firewall Configuration (based on NetFilter and iptables)

  • Understanding packet flow through filter chains
  • Creating custom chains

Proxy Servers

  • WWW Proxy using Squid

Cryptography

  • SSLwrap
  • SSH and SCP
  • SSH Tunneling

IP Spoofing

  • Gathering information about IP address and domain ownership
  • Reporting legal breaches to the appropriate authorities

Requirements

Participants should have a basic understanding of any Unix-like operating system and the fundamental structure of TCP/IP networks.

 14 Hours

Number of participants


Price per participant

Testimonials (2)

Provisional Upcoming Courses (Require 5+ participants)

Related Categories