Course Outline

Turn off unnecessary services

Flood Ping

Sniffing

  • Sniffit
  • Ettercap
  • Tcpdump

Network monitoring

  • Scanning ports (nmap, nessus)
  • LAN traffic monitor (iptraf)
  • Monitoring changes in Ethernet network interface cards, and IP number by users (arpwatch)
  • Dump traffic on a network (tcpdump)

Logging packets

  • Log packets from the use of mechanisms NetFilters and iptables
  • IP Protocols Logger (ippl)

Firewall (based on NetFilters and iptables)

  • Packet path through the filters
  • Create your own chains

Proxies

  • WWW Proxy (Squid)

Cryptography

  • SSLwrap
  • SSH and SCP
  • SSH Tunnelling

Spoofing

  • Obtaining information about the owner of the IP address and domain
  • Alert the authorities of a breach of the law

Requirements

Knowledge of any Unix-like system, and the basic structure of TCP / IP networks.

  14 Hours
 

Testimonials

Related Courses

Introduction to Arch Linux for System Administrators

 14 hours

Arch Linux is an independently developed GNU/Linux distribution. It is often referred to as the simple Linux as it provides a minimal base system, allowing users to configure it only to add what is required. In this instructor-led, live training,

Debian Administration

 35 hours

This is a comprehensive training course for administering Debian GNU/Linux operating system. It is always delivered on the current version of Debian.

IoT Programming with Python

 14 hours

Internet of Things (IoT) is a network infrastructure that connects physical objects and software applications wirelessly, allowing them to communicate with each other and exchange data via network communications, cloud computing, and data capture.

Introduction to IoT Using Raspberry Pi

 14 hours

Internet of Things (IoT) is a network infrastructure that connects physical objects and software applications wirelessly, allowing them to communicate with each other and exchange data via network communications, cloud computing, and data

Raspberry Pi + OpenCV for Facial Recognition

 21 hours

This instructor-led, live training introduces the software, hardware, and step-by-step process needed to build a facial recognition system from scratch. Facial Recognition is also known as Face Recognition. The hardware used in this lab includes

Kali Linux Penetration Testing (Advanced)

 21 hours

Kali Linux is a Linux distribution created for digital forensics and penetration testing. Advanced penetration testing with Kali Linux is a more advanced technology to use in penetration testing and security auditing with Linux distribution. This

Kali Linux Penetration Testing (Intermediary)

 14 hours

Kali Linux is a Linux distribution created for digital forensics and penetration testing. Penetration testing with Kali Linux provides an advanced platform for ethical hacking, security analysis, bug bounty hunt, and much more. This

Penetration Testing: Python and Kali Linux

 14 hours

Kali Linux is a Linux distribution created for digital forensics and penetration testing. With Python, users can develop penetration testing programs in Kali Linux. This instructor-led, live training (online or onsite) is aimed at penetration

Linux Kernel for System Administrators

 14 hours

Linux Kernel is an open source, monolithic kernel operating system that is at the core of the Linux family of operating systems. Using the Linux Kernel, users can operate and manage the LinuxFile system, perform server maintenance, and more. This

Lustre File System for Admins

 21 hours

The Lustre file system is an open-source, parallel file system aimed at High Performance Computing (HPC) simulation environments. This instructor-led, live training (online or onsite) is aimed at engineers who wish to administer and monitor a

OSTree

 14 hours

This instructor-led, live training (online or onsite) is aimed at engineers wishing to package, deploy, upgrade and version control entire Linux systems quickly and at scale. By the end of this training, participants will be able

Raspberry Pi for Beginners

 14 hours

Raspberry Pi is a very small, single-board computer. In this instructor-led, live training, participants will learn how to set up and program the Raspberry Pi to serve as an interactive and powerful embedded system. By the end of this

Red Hat Enterprise Linux (RHEL) Administration

 21 hours

Red Hat Enterprise Linux (RHEL) is a Linux distribution for commercial enterprise. It provides a stable foundation for open source technologies (Ansible, OpenStack, Podman, etc.), making system administration, tasks automation, and application

Introduction to Snap Packages

 7 hours

Snap is an open-source Linux packaging system created by Ubuntu for simplifying package installation and maintenance. It does this by resolving version-related dependency conflicts. By allowing developers to put everything that their software

Ubuntu Server Overview

 21 hours

This course has been created for managers, system architects, existing Unix or Windows administrators or anyone who wants to know what Ubuntu Server operating system has to offer. This course in most cases answers the question WHAT Ubuntu Server can