Course Outline
Turn off unnecessary services
Flood Ping
Sniffing
- Sniffit
- Ettercap
- Tcpdump
Network monitoring
- Scanning ports (nmap, nessus)
- LAN traffic monitor (iptraf)
- Monitoring changes in Ethernet network interface cards, and IP number by users (arpwatch)
- Dump traffic on a network (tcpdump)
Logging packets
- Log packets from the use of mechanisms NetFilters and iptables
- IP Protocols Logger (ippl)
Firewall (based on NetFilters and iptables)
- Packet path through the filters
- Create your own chains
Proxies
- WWW Proxy (Squid)
Cryptography
- SSLwrap
- SSH and SCP
- SSH Tunnelling
Spoofing
- Obtaining information about the owner of the IP address and domain
- Alert the authorities of a breach of the law
Requirements
Knowledge of any Unix-like system, and the basic structure of TCP / IP networks.
Testimonials
Related Courses
Introduction to Arch Linux for System Administrators
14 hoursArch Linux is an independently developed GNU/Linux distribution. It is often referred to as the simple Linux as it provides a minimal base system, allowing users to configure it only to add what is required. In this instructor-led, live training,
Debian Administration
35 hoursThis is a comprehensive training course for administering Debian GNU/Linux operating system. It is always delivered on the current version of Debian.
IoT Programming with Python
14 hoursInternet of Things (IoT) is a network infrastructure that connects physical objects and software applications wirelessly, allowing them to communicate with each other and exchange data via network communications, cloud computing, and data capture.
Introduction to IoT Using Raspberry Pi
14 hoursInternet of Things (IoT) is a network infrastructure that connects physical objects and software applications wirelessly, allowing them to communicate with each other and exchange data via network communications, cloud computing, and data
Raspberry Pi + OpenCV for Facial Recognition
21 hoursThis instructor-led, live training introduces the software, hardware, and step-by-step process needed to build a facial recognition system from scratch. Facial Recognition is also known as Face Recognition. The hardware used in this lab includes
Kali Linux Penetration Testing (Advanced)
21 hoursKali Linux is a Linux distribution created for digital forensics and penetration testing. Advanced penetration testing with Kali Linux is a more advanced technology to use in penetration testing and security auditing with Linux distribution. This
Kali Linux Penetration Testing (Intermediary)
14 hoursKali Linux is a Linux distribution created for digital forensics and penetration testing. Penetration testing with Kali Linux provides an advanced platform for ethical hacking, security analysis, bug bounty hunt, and much more. This
Penetration Testing: Python and Kali Linux
14 hoursKali Linux is a Linux distribution created for digital forensics and penetration testing. With Python, users can develop penetration testing programs in Kali Linux. This instructor-led, live training (online or onsite) is aimed at penetration
Linux Kernel for System Administrators
14 hoursLinux Kernel is an open source, monolithic kernel operating system that is at the core of the Linux family of operating systems. Using the Linux Kernel, users can operate and manage the LinuxFile system, perform server maintenance, and more. This
Lustre File System for Admins
21 hoursThe Lustre file system is an open-source, parallel file system aimed at High Performance Computing (HPC) simulation environments. This instructor-led, live training (online or onsite) is aimed at engineers who wish to administer and monitor a
OSTree
14 hoursThis instructor-led, live training (online or onsite) is aimed at engineers wishing to package, deploy, upgrade and version control entire Linux systems quickly and at scale. By the end of this training, participants will be able
Raspberry Pi for Beginners
14 hoursRaspberry Pi is a very small, single-board computer. In this instructor-led, live training, participants will learn how to set up and program the Raspberry Pi to serve as an interactive and powerful embedded system. By the end of this
Red Hat Enterprise Linux (RHEL) Administration
21 hoursRed Hat Enterprise Linux (RHEL) is a Linux distribution for commercial enterprise. It provides a stable foundation for open source technologies (Ansible, OpenStack, Podman, etc.), making system administration, tasks automation, and application
Introduction to Snap Packages
7 hoursSnap is an open-source Linux packaging system created by Ubuntu for simplifying package installation and maintenance. It does this by resolving version-related dependency conflicts. By allowing developers to put everything that their software
Ubuntu Server Overview
21 hoursThis course has been created for managers, system architects, existing Unix or Windows administrators or anyone who wants to know what Ubuntu Server operating system has to offer. This course in most cases answers the question WHAT Ubuntu Server can