BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Course Overview
This 5-day instructor-led course offers a comprehensive and hands-on introduction to PCAP analysis, designed for cybersecurity professionals, network administrators, and IT security analysts. Participants will delve into the fundamental components of the TCP/IP protocol, compare IPv4 and IPv6, and explore advanced network routing techniques.
Through practical lab exercises, students will apply session analysis techniques, evaluate IPsec network traffic, and understand packet filtering methods. The course also covers hacking methodologies, advanced attack components, and custom packet creation, equipping participants with the skills needed to detect and analyze sophisticated cyber threats effectively. By the end of this immersive training, participants will be proficient in network traffic analysis and prepared to tackle real-world cybersecurity challenges. At the completion of this course, participants will be able to:
- Understand the components and characteristics of TCP/IP at the lowest level.
- Compare IPv4 to IPv6 protocols.
- Determine routes and IP routing on a network.
- Apply session analysis techniques to network traffic.
- Evaluate IPsec network traffic and understand packet filtering techniques.
- List the steps of a hacking methodology.
- Perform analysis of hacking techniques and tools.
- Understand the components of advanced and sophisticated attacks.
- Create and customize their own packets to confuse and evade detection and observation.
Schedule
Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.
Course Outline
Module 1: TCP/IP Protocol Fundamentals
Introduction to TCP/IP
- Overview of the TCP/IP model
- Detailed breakdown of each layer
Components and Characteristics of TCP/IP
- Understanding packet structures
- Examination of headers and payloads
Module 2: IPv4 and IPv6 Comparison
IPv4 Fundamentals
- Addressing and subnetting
- Header format and analysis
IPv6 Fundamentals
- Addressing and subnetting
- Header format and analysis
Comparing IPv4 and IPv6
- Key differences and implications
- Transition mechanisms
Module 3: Network Routing and IP Routing
Routing Basics
- Understanding routing tables
- Static vs. dynamic routing
IP Routing
- Routing protocols (RIP, OSPF, BGP)
- Route determination and path selection
Module 4: Session Analysis Techniques
Introduction to Session Analysis
- Definition and importance of session analysis
- Tools and methodologies
Analyzing Network Traffic
- Identifying and tracking sessions
- Practical lab exercises
Module 5: IPsec and Packet Filtering
Understanding IPsec
- IPsec fundamentals and architecture
- Use cases and practical applications
Packet Filtering Techniques
- Firewalls and access control lists (ACLs)
- Deep packet inspection (DPI)
Module 6: Hacking Methodologies and Techniques
Hacking Methodology Overview
- Phases of a hacking attack
- Reconnaissance to exploitation
Analysis of Hacking Techniques and Tools
- Common tools used in attacks
- Lab exercises on tool usage and detection
Module 7: Advanced and Sophisticated Attacks
Components of Advanced Attacks
- Understanding APTs (Advanced Persistent Threats)
- Case studies and real-world examples
Sophisticated Attack Techniques
- Evasion and obfuscation methods
- Advanced malware and exploit analysis
Module 8: Custom Packet Creation and Modification
- Introduction to Custom Packet Creation
- Tools and software for packet crafting
Basic packet creation techniques
- Packet Modification for Obfuscation
- Techniques for modifying packets
- Lab exercises on evasion and detection
Conclusion
- Review and summary of key concepts
- Final assessment and practical exam
- Q&A and further resources for continued learning
Course Audience
This course is intended for:
- Cybersecurity Professionals
- Network Administrators
- IT Security Analysts
- Incident Response Team Members
- Ethical Hackers and Penetration Testers
- Cybersecurity Students
- Security Enthusiasts
Prerequisites:
- A solid understanding of basic networking concepts.
- Familiarity with the OSI and TCP/IP models.
- Basic knowledge of IP addressing and subnetting.
- Experience with network protocols and packet-level communications.
- Prior exposure to cybersecurity principles and practices is beneficial but not required.
BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org