FIVE   |   THIRTEEN   |   92%   |   40

        SCENARIOS                     LABS                            HANDS-ON           DURATION

Every organization, regardless of size, industry, or infrastructure, requires a network security expert in place to protect it from the ever-growing landscape of cyber threats today. After this course, you will be able to discover security vulnerabilities across the entire network by using network hacking techniques and vulnerability scanning. You will understand the various types of firewalls that are available and master the hardening for both Windows and Linux servers.

LAB 01

Security Procedures

LAB 05

Reversing Malware Network Behavior

LAB 09

IPv6 Security

LAB 02

Setting your Domain

LAB 06

Analyzing Network Attacks

LAB 10

IDS Configurations

LAB 03

Identifying Attacks

LAB 04

Analyzing C&C Communications

LAB 07

Working with CVE

LAB 08

Working with Firewalls

LAB 11


LAB 12

Securing Linux

LAB 13

Securing Windows

Scenario: NS001

Just before last Christmas and year-end holidays, Citrix announced that it is Citrix Application Delivery Controller (ADC) and Citrix Gateway are vulnerable. The vulnerability allows the attacker to execute arbitrary code on the servers. As the Network security expert, your company put you in charge of this case. Use your Network abilities to find the vulnerability and mitigate it.


Scenario: NS002

Kaspersky Lab reports that A massive DNS cache poisoning attack attempting to infect users trying to access websites is currently underway in Brazil. Several large ISPs in the highly connected country have been affected by the attack. You have been tasked to identify details related to the attack to remediate any damage discovered in the identification phase.

Annotation 2020-07-23 140329.jpg

Scenario: NS003

An investment company in India was a victim of data exposure. By using a popular open-source email server software, which allowed a remote attacker to crash or potentially execute malicious code on the targeted servers. The Indian company hired you as the Network expert to find leads to the attack on their mail servers and mitigate it by hardening their distributions.


Scenario: NS004

It was discovered that WhatsApp had a critical vulnerability that attackers exploited. Canadian trade company was a victim of the flaw when an attacker silently installed spyware using the vulnerability and targeted customers' phones by merely placing a WhatsApp video call with specially crafted requests. You need to investigate the case, using traffic logs that were monitored during the attack.


Scenario: NS005

Cybersecurity researchers discovered evidence of Iranian state-sponsored hackers targeting dozens of companies such as IT, telecommunication, oil, gas, government, and security sectors in Israel. The attackers used the exploitation of unpatched VPN vulnerabilities to penetrate and steal information from the targets. Use your security skills to find mitigation for the unpatched VPN.

  • White LinkedIn Icon
  • White Facebook Icon

Ze'ev Jabotinsky St 7,
Ramat Gan, IL.

© 2020 by ThinkCyber