arrow_back
Disclaimer
Tititle1
Unit 0: Introduction to the Course
Introduction to the course - Part 1
Introduction to the course - Part 2
Unit 1: Security of Networks
Traffic Analysis
1.1 - Installing Wireshark & NetworkMiner - Part 1
1.1 - ICMP Anaysis - Part 2
How do Systems talk to each other
1.2 - How do systems talk to each other
PCAP 1 - gen-googlemaps
PCAP 2 - http-chappellu2011
Need for Network Security
1.3 - Need for Security
Network Security Attacks
1.4 - Network Security Attacks - Part-1
1.4 - Network Security Attacks - Part-2
Security at Layers
1.5 - Security in Layers
Basic Level Traffic Analysis
1.6 - Hands-on Session 1 PCAP
1.6 - Hands-on Session 1
1.6 - Hands-on Session 2 PCAP
1.6 - Hands-on Session 2
1.6 - Hands-on Session 3 PCAP
1.6 - Hands-on Session 3
1.6 - Hands-on Session 4
1.6 - Hands-on Session 5
1.6 - Hands-on Session 6
Unit 2: Network Security Architectures
Encryption
2.1 - Encryption
Network Devices
2.2 - Network Devices
Secure Network Architecture
2.3 - Secure Network Architecture
Best Practices for Network Defense
2.4 - Practices for Network Defense
Hands-on Sessions Advanced Analysis of Network Packets
2.5 - Hands-on-1 - Investigate Keylogger on your network
2.5 - Hands-on-1 PCAP - Keylogger investigation
2.5 - Hands-on-2 - Investigate External Scan Attempts
2.5 - Hands-on-2 PCAP - External scan attempts
2.5 - Hands-on-3 - Investigate Network Flood
2.5 - Hands-on-3 PCAP ICMP Flood investigation
Unit 3: Security Management
Network Security Systems
3.1 - Network Security Devices
Network & App Monitoring and Management
3.2 - Network & App Monitoring and Management
Network Assessment & Vulnerability Scanning
3.3 - Network Assessment & Vulnerability Scanning
Preview - Zero To Hero: Network Traffic Analysis
Discuss (
0
)
navigate_before
Previous
Next
navigate_next