FIVE   |   EIGHT   |   90%   |   40

          SCENARIOS                     LABS                     HANDS-ON           DURATION

The Network Research training aims to address cyber challenges experienced on the network level. It will cover various attack techniques and how to defend them. By the end of the training, participants will be able to build and maintain a secure network, protect data, manage vulnerabilities, implement active access control measures, and regularly monitor the network for inconsistencies.

LAB 01

Wireshark – Diving into Packets

LAB 02

Working with Linux

LAB 03

Advanced Wireshark

LAB 04

Network Analyzing Automation with Tshark

LAB 05

Working with Zeek tools

LAB 06

Cybersecurity Vectors

LAB 07

Network Attacks

LAB 08

General Attacks

Scenario: NR001

During the World Cup in Romania, fans dream about finding affordable tickets. This summer, according to the Federal Trade Commission, scammers are duping fans with phishing emails that include enticing, but fake, free trips to Romania. The research discovered a large number of phishing emails, and they require your assistance to investigate them.


Scenario: NR002

A network administrator of a big company suspects that an employee was tricked by a scam email, in which he accidentally downloaded a Trojan malware.


Scenario: NR003

An advanced group of hackers has been recently spotted to be sending a vast amount of phishing mail addresses, successfully hacking a large number of top executives. One of the hacked companies suspects that even after mitigating the issue, a backdoor is present and alive at the system.


Scenario: NR004

German police are seeking your help in gathering information related to the IP address that could lead to the cell phone device used by a DHL blackmailer whom last year parceled out bombs at different addresses in Brandenburg and Berlin.


Scenario: NR005

Recently a large credit card company had a large data breach. The credit card database was hacked, stolen, and leaked to the DarkNet. Now, the company requested your firm’s assistance on finding the attackers and mitigating the leak, use your forensics knowledge to solve the data leak.


© 2020 by ThinkCyber

THE 2020