FIVE   |   TWELVE   |   92%   |   40

        SCENARIOS                     LABS                            HANDS-ON           DURATION

Every organization, regardless of size, industry, or infrastructure, requires a network security expert in place to protect it from the ever-growing landscape of cyber threats today. After this course, you will be able to discover security vulnerabilities across the entire network by using network hacking techniques and vulnerability scanning. You will understand the various types of firewalls that are available and master the hardening for both Windows and Linux servers.

LAB 01

Network Security

LAB 02

Advanced TCP/IP

LAB 03


LAB 04

Packet Structure and Analysis

LAB 05

Analyzing the Network

LAB 09

Counter Attacks

LAB 06

Analysis of Leaked Security Information

LAB 10

Working with VPNs

LAB 07

Network Security Threats

LAB 08


LAB 11

Securing Linux

LAB 12

Securing Windows

Scenario: NS001

Just before last Christmas and year-end holidays, Citrix announced that it is Citrix Application Delivery Controller (ADC) and Citrix Gateway are vulnerable. The vulnerability allows the attacker the execute arbitrary code on the servers. As the Network security expert, your company put you in charge of this case. Use your Network abilities to find the vulnerability and mitigate it.


Scenario: NS002

A team of German cybersecurity researchers discovered a new cache poisoning attack against web caching systems. The issue affected sites running behind reverse proxy cache systems. You have been tasked to identify details related to the attack to remediate any damage discovered in the identification phase.


Scenario: NS003

An investment company in India was a victim of data exposure. By using a popular open-source email server software, which allowed a remote attacker to crash or potentially execute malicious code on the targeted servers. The Indian company hired you as the Network expert to find leads to the attack on their mail servers and mitigate it by hardening their distributions.


Scenario: NS004

It was discovered that WhatsApp had a critical vulnerability that attackers exploited. Canadian trade company was a victim of the flaw when an attacker silently installed spyware using the vulnerability and targeted customers' phones by merely placing a WhatsApp video call with specially crafted requests. You need to investigate the case, using traffic logs that were monitored during the attack.


Scenario: NS005

Cybersecurity researchers discovered evidence of Iranian state-sponsored hackers targeting dozens of companies such as IT, telecommunication, oil, gas, government, and security sectors in Israel. The attackers used the exploitation of unpatched VPN vulnerabilities to penetrate and steal information from the targets. Use your security skills to find mitigation for the unpatched VPN.


© 2020 by ThinkCyber

THE 2020