Network Research

NS106

The Network Research training aims to address cyber challenges experienced on the network level. It will cover various attack techniques and how to defend them. By the end of the training, participants will be able to build and maintain a secure network, protect data, manage vulnerabilities, implement active access control measures, and regularly monitor the network for inconsistencies.

​

NS106 Final Project: create a code that will run on a remote server and act as a Command and Control server (C2C).

FIVE   |   EIGHTEEN   |   90%   |   40

   SCENARIOS                           LABS                              HANDS-ON           DURATION

LAB 01

​

Linux and Basic Commands

LAB 02

​

Text Manipulation

LAB 03

​

Using the Internet

LAB 04

​

Linux Services

LAB 05

​

Scanning with Nmap

LAB 06

​

Scanning with Shodan

LAB 07

​

Linux Bash Scripts

LAB 08

​

Offline Brute-Force

LAB 09

​

Online Brute-Force

LAB 10

​

Netcat

LAB 11

​

Using Wireshark

LAB 12

​

Using Tshark

LAB 13

​

Anonymous

LAB 14

​

Exploits

LAB 15

​

File Structure

LAB 16

​

Steganography 

LAB 17

​

Trojans

LAB 18

​

Network Attacks

Scenario: NR001

During the World Cup in Romania, fans dream about finding affordable tickets. This summer, according to the Federal Trade Commission, scammers are duping fans with phishing emails that include enticing, but fake, free trips to Romania. The research discovered a large number of phishing emails, and they require your assistance to investigate them.

photo_2018-07-07_01-00-14.jpg

Scenario: NR002

A network administrator of a big company suspects that an employee was tricked by a scam email, in which he accidentally downloaded a Trojan malware.

photo_2020-03-29_22-17-38.jpg

Scenario: NR003

An advanced group of hackers has been recently spotted to be sending a vast amount of phishing mail addresses, successfully hacking a large number of top executives. One of the hacked companies suspects that even after mitigating the issue, a backdoor is present and alive at the system.

photo_2020-04-30_17-26-11.jpg

Scenario: NR004

German police are seeking your help in gathering information related to the IP address that could lead to the cell phone device used by a DHL blackmailer whom last year parceled out bombs at different addresses in Brandenburg and Berlin.

photo_2020-05-21_17-28-44.jpg

Scenario: NR005

Recently a large credit card company had a large data breach. The credit card database was hacked, stolen, and leaked to the DarkNet. Now, the company requested your firm’s assistance on finding the attackers and mitigating the leak, use your forensics knowledge to solve the data leak.

photo_2020-03-31_21-56-27.jpg

To be eligible for the certificate, the student must complete four scenarios (out of five) and submit the project associated with the course.


Score distribution: 60% scenarios + 40% project.

Network Research Certification

What our students say

"It was a challenging and interesting hands-on training."

"The simulation scenarios were well crafted, most were based on real-life cases."

LINKS
CONTACT
  • White LinkedIn Icon
  • White Facebook Icon

Ze'ev Jabotinsky St 7,
Ramat Gan, IL.
+972-3-9629018
info@ThinkCyber.co.il

© 2020 by ThinkCyber