Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Disabling Unnecessary Services
Flood Ping Attacks
Sniffing Techniques
- Sniffit
- Ettercap
- Tcpdump
Network Monitoring
- Port scanning using tools like nmap and Nessus
- LAN traffic monitoring with iptraf
- Monitoring changes in Ethernet network interface cards and IP assignments by users (arpwatch)
- Network traffic dumping with tcpdump
Packet Logging
- Logging packets using NetFilters and iptables mechanisms
- IP Protocols Logger (ippl)
Firewall Configuration (Based on NetFilters and iptables)
- Understanding packet flow through filters
- Creating custom chains
Proxy Servers
- WWW Proxy configuration using Squid
Cryptography
- SSLwrap
- SSH and SCP
- SSH Tunneling
Spoofing and Information Gathering
- Gathering information about IP address and domain ownership
- Reporting legal violations to the appropriate authorities
Requirements
Familiarity with any Unix-like operating system and a foundational understanding of TCP/IP network structures.
14 Hours
Testimonials (2)
experienced trainer
Monika Biskupska - Osrodek Przetwarzania Informacji - Panstwowy Instytut Badawczy
Course - Kubernetes Security Fundamentals (LFS460)
trainer has hands-on knowledge