Phoenix TS

Network Defense Range

Course Overview

The course assumes participants know how to use a computer, and that they’re familiar with basic networking and security principles. It does not assume that they’ve set up basic virtual machines before. Participants will establish the foundation in TCP/IP, this is critical to being able to perform network analysis on a modern enterprise network. Participants will benefit most from this course if they want to learn basic monitoring and analysis tasks, or if they want to augment their understanding of intrusion analysis. Participants will benefit most from this course if they want to learn network analysis tasks, intrusion analysis and incident response. Participants will learn how to recognize and analyze abnormal traffic that could be an attack or an error on the network. Furthermore, the course will add tools to assist in the process of going deeper into analysis. After participants complete this course, they will be able to do the following:

  • Identify the required components for a cyber range and build it
  • Understand to the lowest level the components and characteristics of TCP/IP
  • Apply session analysis techniques to network traffic
  • Evaluate IPsec network traffic and understand packet filtering techniques
  • List the steps of a hacking methodology
  • Perform analysis of hacking techniques and tools
  • Understand the components of advanced and sophisticated attacks
  • Identify the steps of protocol analysis
  • Deploy filters to expedite the analysis of network capture files
  • Perform low-level analysis using low-level protocol analysis tools
  • Create and customize their own network packets to perform different tasks
  • Install, Configure and Tune an Intrusion Detection System
  • Deploy analysis tools to assist with network analysis
  • Evaluate potential incidents and draft reports of an incident
  • List the steps of basic and advanced process analysis
  • Understand live memory and the basics of malware analysis
  • Explore the concept of leveraging results with different tools


Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 240-667-7757.

Course Outline

Module 1: Building a Cyber Range

Module 2: Introduction to Hacking

Module 3: Hacking Analysis Methodology

Module 4: Web Application Hacking

Module 5: Components of Sophisticated Attacks

Module 6: Conducting Protocol Analysis

Module 7: Protocol Analysis One

Module 8: Protocol Analysis Two

Module 9: Protocol Analysis Three

Module 10: Analyzing Basic Attacks

Module 11: Protocol Analysis Tools

Module 12: Advanced Attack Analysis

Module 13: Incident Response

Module 14: Basic Process Analysis

Module 15: Advanced Process Analysis

Module 16: Live Memory Analysis

Module 17: Malware Introduction

Module 18: Malware Analysis 101

Module 19: Leveraging Analysis Results with tools

Subscribe now

Get new class alerts, promotions, and blog posts

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Download Course Brochure

Enter your information below to download this brochure!