Network Traffic Analysis

Course Overview

This five (5) day course examines the TCP/IP protocol suite at the lowest level and prepares the student for the ability to analyze network communications. The course focuses on the main protocols to include DHCP and others. The student will learn how to identify different components of network communications and determine if the communications is normal or abnormal. The student will be introduced to the hacking methodology and the course will conclude with a challenge for the student to deploy the concepts from the class and create their own network analysis cyber range. At the end of this course students will be able to:   

  • Demonstrate knowledge of the TCP/IP protocol suite at the lowest level  
  • Analyze network communications 
  • Identify different components of network communications  
  • Determine if the communications are normal or abnormal 
  • Examine the hacking methodology  
  • Create a network analysis cyber range 


Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 240-667-7757.

Course Outline

Module 1: Building a Cyber Range 

  • Introduction 
  • Selecting the software 
  • Designing the network 
  • Building the network switches  
  • Adding machines 
  • LAB: Designing a Cyber Range 

Module 2: Introduction to TCP/IP 

  • Lab: TCP/IP OS Tools  

Module 3: Protocol Suite 

  • Lab: TCP/IP Layers 
  • Lab: Fragmentation and Reassembly 
  • Lab: Discovery 
  • Lab: TCP and UDP 
  • Lab: Sockets 

Module 4: IP Addressing 

  • Lab: IP Addressing  

Module 5: Subnetting  

  • Lab: Subnetting  

Module 6: IP Routing  

  • IP Routing  

Module 7: Dynamic Host Configuration Protocol  

  • Lab: DHCP  
  • Lab: Configuring and testing DHCP  

Module 8: Host Name Resolution  

  • Lab: Naming Resolution  

Module 9: Domain Name System  

  • Lab: DNS Components 
  • Lab: DNS configuration  

Module 10: Introduction to Sessions  

  • Lab: Sessions Intro 
  • Lab: Web Sessions 
  • Lab: Ipv6 Sessions  

Module 11: IPsec and Packet Filtering 

  • Lab IPsec 
  • Lab: Stateless and Stateful packet filtering  
  • Lab: Firewall configuration and deployment 

Module 12: Virtual Private Network  

  • Lab: VPN 

Module 13: IPv6 Technologies and Transitions  

  • Lab: IPv6 Technologies  

Module 14: Troubleshooting TCP/IP  

  • Lab: Troubleshooting 

Module 15: Introduction to Hacking  

  • Lab: Scanning Methodology 
  • Lab: Exploitation and Post Exploitation  
  • Threat classification and analysis 

Module 16: Hacking Analysis Methodology  

  • Lab: Hacking Methodology Analysis 

Module 17: Web Application Hacking 

  • Web Application Hacking Analysis  

Module 18: Components of Sophisticated Attacks 

  • Lab: Sophisticated Attack Analysis  

Module 19: Attack Analysis Workshop  Module 20: Range Deployment Challenge  

Subscribe now

Get new class alerts, promotions, and blog posts

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Download Course Brochure

Enter your information below to download this brochure!