Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Disabling Unnecessary Services
Flood Ping Attacks
Packet Sniffing
- Sniffit
- Ettercap
- Tcpdump
Network Monitoring
- Port scanning using tools such as Nmap and Nessus
- Monitoring LAN traffic with iptraf
- Tracking changes to Ethernet network interfaces and IP addresses assigned to users via arpwatch
- Capturing and analysing network traffic using tcpdump
Packet Logging
- Logging packets using NetFilter and iptables mechanisms
- Utilising the IP Protocols Logger (ippl)
Firewall Configuration (based on NetFilter and iptables)
- Understanding packet flow through filter chains
- Creating custom chains
Proxy Servers
- WWW Proxy using Squid
Cryptography
- SSLwrap
- SSH and SCP
- SSH Tunneling
IP Spoofing
- Gathering information about IP address and domain ownership
- Reporting legal breaches to the appropriate authorities
Requirements
Participants should have a basic understanding of any Unix-like operating system and the fundamental structure of TCP/IP networks.
14 Hours
Testimonials (2)
experienced trainer
Monika Biskupska - Osrodek Przetwarzania Informacji - Panstwowy Instytut Badawczy
Course - Kubernetes Security Fundamentals (LFS460)
trainer has hands-on knowledge