BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Course Overview
The course assumes participants know how to use a computer, and that they’re familiar with basic networking and security principles. It does not assume that they’ve set up basic virtual machines before. Participants will establish the foundation in TCP/IP, this is critical to being able to perform network analysis on a modern enterprise network. Participants will benefit most from this course if they want to learn basic monitoring and analysis tasks, or if they want to augment their understanding of intrusion analysis. Participants will benefit most from this course if they want to learn network analysis tasks, intrusion analysis and incident response. Participants will learn how to recognize and analyze abnormal traffic that could be an attack or an error on the network. Furthermore, the course will add tools to assist in the process of going deeper into analysis. After participants complete this course, they will be able to do the following:
- Identify the required components for a cyber range and build it
- Understand to the lowest level the components and characteristics of TCP/IP
- Apply session analysis techniques to network traffic
- Evaluate IPsec network traffic and understand packet filtering techniques
- List the steps of a hacking methodology
- Perform analysis of hacking techniques and tools
- Understand the components of advanced and sophisticated attacks
- Identify the steps of protocol analysis
- Deploy filters to expedite the analysis of network capture files
- Perform low-level analysis using low-level protocol analysis tools
- Create and customize their own network packets to perform different tasks
- Install, Configure and Tune an Intrusion Detection System
- Deploy analysis tools to assist with network analysis
- Evaluate potential incidents and draft reports of an incident
- List the steps of basic and advanced process analysis
- Understand live memory and the basics of malware analysis
- Explore the concept of leveraging results with different tools
Schedule
Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.
Course Outline
Module 1: Building a Cyber Range
Module 2: Introduction to Hacking
Module 3: Hacking Analysis Methodology
Module 4: Web Application Hacking
Module 5: Components of Sophisticated Attacks
Module 6: Conducting Protocol Analysis
Module 7: Protocol Analysis One
Module 8: Protocol Analysis Two
Module 9: Protocol Analysis Three
Module 10: Analyzing Basic Attacks
Module 11: Protocol Analysis Tools
Module 12: Advanced Attack Analysis
Module 13: Incident Response
Module 14: Basic Process Analysis
Module 15: Advanced Process Analysis
Module 16: Live Memory Analysis
Module 17: Malware Introduction
Module 18: Malware Analysis 101
Module 19: Leveraging Analysis Results with tools
BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org