Network Traffic Analysis

Course Overview

This five (5) day instructor led course examines the TCP/IP protocol suite at the lowest level and prepares the student for the ability to analyze network communications. The course focuses on the main protocols to include DHCP and others. The student will learn how to identify different components of network communications and determine if the communications is normal or abnormal. The student will be introduced to the hacking methodology and the course will conclude with a challenge for the student to deploy the concepts from the class and create their own network analysis cyber range. At the conclusion of this course, participants will be able to:

  • Demonstrate knowledge of the TCP/IP protocol suite at the lowest level
  • Analyze network communications
  • Identify different components of network communications
  • Determine if the communications are normal or abnormal
  • Examine the hacking methodology
  • Create a network analysis cyber range


Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 240-667-7757.


Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training


5 Days



Course Outline

Module 1: Building a Cyber Range

  • Introduction
  • Selecting the software
  • Designing the network
  • Building the network switches
  • Adding machines
  • LAB: Designing a Cyber Range

Module 2: Introduction to TCP/IP

  • Lab: TCP/IP OS Tools

Module 3: Protocol Suite

  • Lab: TCP/IP Layers
  • Lab: Fragmentation and Reassembly
  • Lab: Discovery
  • Lab: TCP and UDP
  • Lab: Sockets

Module 4: IP Addressing

  • Lab: IP Addressing

Module 5: Subnetting

  • Lab: Subnetting

Module 6: IP Routing

  • IP Routing

Module 7: Dynamic Host Configuration Protocol

  • Lab: DHCP
  • Lab: Configuring and testing DHCP

Module 8: Host Name Resolution

  • Lab: Naming Resolution

Module 9: Domain Name System

  • Lab: DNS Components
  • Lab: DNS configuration

Module 10: Introduction to Sessions

  • Lab: Sessions Intro
  • Lab: Web Sessions
  • Lab: Ipv6 Sessions

Module 11: IPsec and Packet Filtering

  • Lab IPsec
  • Lab: Stateless and Stateful packet filtering
  • Lab: Firewall configuration and deployment

Module 12: Virtual Private Network

  • Lab: VPN

Module 13: IPv6 Technologies and Transitions

  • Lab: IPv6 Technologies

Module 14: Troubleshooting TCP/IP

  • Lab: Troubleshooting

Module 15: Introduction to Hacking

  • Lab: Scanning Methodology
  • Lab: Exploitation and Post Exploitation
  • Threat classification and analysis

Module 16: Hacking Analysis Methodology

  • Lab: Hacking Methodology Analysis

Module 17: Web Application Hacking

  • Web Application Hacking Analysis

Module 18: Components of Sophisticated Attacks

  • Lab: Sophisticated Attack Analysis

Module 19: Attack Analysis Workshop

Module 20: Range Deployment Challenge



Subscribe now

Get new class alerts, promotions, and blog posts

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Download Course Brochure

Enter your information below to download this brochure!