Network Research
NS106
The Network Research training aims to address cyber challenges experienced on the network level. It will cover various attack techniques and how to defend them. By the end of the training, participants will be able to build and maintain a secure network, protect data, manage vulnerabilities, implement active access control measures, and regularly monitor the network for inconsistencies.
​
NS106 Final Project: create a code that will run on a remote server and act as a Command and Control server (C2C).
FIVE | EIGHTEEN | 90% | 40
SCENARIOS LABS HANDS-ON DURATION

LAB 01
​
Linux and Basic Commands
LAB 02
​
Text Manipulation
LAB 03
​
Using the Internet
LAB 04
​
Linux Services
LAB 05
​
Scanning with Nmap
LAB 06
​
Scanning with Shodan
LAB 07
​
Linux Bash Scripts
LAB 08
​
Offline Brute-Force
LAB 09
​
Online Brute-Force
LAB 10
​
Netcat
LAB 11
​
Using Wireshark
LAB 12
​
Using Tshark
LAB 13
​
Anonymous
LAB 14
​
Exploits
LAB 15
​
File Structure
LAB 16
​
Steganography
LAB 17
​
Trojans
LAB 18
​
Network Attacks
Scenario: NR001
During the World Cup in Romania, fans dream about finding affordable tickets. This summer, according to the Federal Trade Commission, scammers are duping fans with phishing emails that include enticing, but fake, free trips to Romania. The research discovered a large number of phishing emails, and they require your assistance to investigate them.
Scenario: NR002
A network administrator of a big company suspects that an employee was tricked by a scam email, in which he accidentally downloaded a Trojan malware.
Scenario: NR003
An advanced group of hackers has been recently spotted to be sending a vast amount of phishing mail addresses, successfully hacking a large number of top executives. One of the hacked companies suspects that even after mitigating the issue, a backdoor is present and alive at the system.
Scenario: NR004
German police are seeking your help in gathering information related to the IP address that could lead to the cell phone device used by a DHL blackmailer whom last year parceled out bombs at different addresses in Brandenburg and Berlin.
Scenario: NR005
Recently a large credit card company had a large data breach. The credit card database was hacked, stolen, and leaked to the DarkNet. Now, the company requested your firm’s assistance on finding the attackers and mitigating the leak, use your forensics knowledge to solve the data leak.
To be eligible for the certificate, the student must complete four scenarios (out of five) and submit the project associated with the course.
Score distribution: 60% scenarios + 40% project.
Network Research Certification

What our students say
"It was a challenging and interesting hands-on training."

"The simulation scenarios were well crafted, most were based on real-life cases."
