The Network Research training aims to address cyber challenges experienced on the network level. It will cover various attack techniques and how to defend them. By the end of the training, participants will be able to build and maintain a secure network, protect data, manage vulnerabilities, implement active access control measures, and regularly monitor the network for inconsistencies.
NS106 Final Project: create a code that will run on a remote server and act as a Command and Control server (C2C).
FIVE | EIGHTEEN | 90% | 40
SCENARIOS LABS HANDS-ON DURATION
Linux and Basic Commands
Using the Internet
Scanning with Nmap
Scanning with Shodan
Linux Bash Scripts
During the World Cup in Romania, fans dream about finding affordable tickets. This summer, according to the Federal Trade Commission, scammers are duping fans with phishing emails that include enticing, but fake, free trips to Romania. The research discovered a large number of phishing emails, and they require your assistance to investigate them.
A network administrator of a big company suspects that an employee was tricked by a scam email, in which he accidentally downloaded a Trojan malware.
An advanced group of hackers has been recently spotted to be sending a vast amount of phishing mail addresses, successfully hacking a large number of top executives. One of the hacked companies suspects that even after mitigating the issue, a backdoor is present and alive at the system.
German police are seeking your help in gathering information related to the IP address that could lead to the cell phone device used by a DHL blackmailer whom last year parceled out bombs at different addresses in Brandenburg and Berlin.
Recently a large credit card company had a large data breach. The credit card database was hacked, stolen, and leaked to the DarkNet. Now, the company requested your firm’s assistance on finding the attackers and mitigating the leak, use your forensics knowledge to solve the data leak.
To be eligible for the certificate, the student must complete four scenarios (out of five) and submit the project associated with the course.
Score distribution: 60% scenarios + 40% project.
Network Research Certification
What our students say
"It was a challenging and interesting hands-on training."
"The simulation scenarios were well crafted, most were based on real-life cases."