Network Traffic Analysis

Catalog Home Cybersecurity, Hacking & IT Auditing Network Threats

There are no scheduled dates for this course.

  Available by Request

Grow Your Analytic Intelligence.

Network Traffic Analysis will enable students to differentiate between normal and abnormal network traffic. The course focuses on research, filtering, and comparative analysis to identify different types of activity on a network and attribute their source. A subject matter expert will teach you security-related tactics, techniques, and procedures for performing network analysis in today's ever-changing threat landscape. You'll learn to follow conversations through redirection, as well as how to develop custom filters for non-dissected protocols. After completing this course, students will be able to hone in on the key events in a traffic capture and reconstruct the event time line.

Using the tools, skills, and methodologies taught in Days 1 through 4 of the class, on Day 5, students will participate in a competitive capture-the-flag exercise. Designed to challenge the participants, each correctly completed milestone will unlock a successively more difficult challenge.

Before attending this course, student should have:

  • A Broad Understanding of TCP/IP and Associated Protocols
  • Knowledge of Network Hardware and Segment Types
  • Previous Exposure to Wireshark or Other Protocol Analysis Software is also recommended

5 Days/Lecture & Lab

This course is designed for:

  • Network Analysts seeking to develop security-related skills
  • Incident Responders needing to quickly address system security breaches
  • Penetration Testers looking to reduce their detectability
  • Threat Operations Analysts seeking a better understanding of network intrusions
  • All Network Administrators needing a better understanding of network security

  • OSI & TCP/IP Models
  • Number Theory
  • Wireshark Tutorial
  • Day in the life (TCP/IP)
  • Analytic Process
  • Internet Research
  • Traffic Analysis
  • Attribution
  • Research Techniques
  • Start-to-Finish Protocol Analysis
  • Regular Expressions
  • Analysis beyond Wireshark
  • Security Protocols
  • User Agents
  • Cookies
  • Analysis of a Big Capture File
  • Tips and Tricks
  • Student Practical Demonstration





Recently Viewed Courses:

Copyright © 2018 ProTech. All Rights Reserved.

Sign In Create Account

Navigation

Social Media