Network Research


The Network Research training aims to address cyber challenges experienced on the network level. It will cover various attack techniques and how to defend them. By the end of the training, participants will be able to build and maintain a secure network, protect data, manage vulnerabilities, implement active access control measures, and regularly monitor the network for inconsistencies.

NS106 Final Project: create a code that will run on a remote server and act as a Command and Control server (C2C).

FIVE   |   EIGHTEEN   |   90%   |   40

   SCENARIOS                           LABS                              HANDS-ON           DURATION

LAB 01

Linux and Basic Commands

LAB 02

Text Manipulation

LAB 03

Using the Internet

LAB 04

Linux Services

LAB 05

Scanning with Nmap

LAB 06

Scanning with Shodan

LAB 07

Linux Bash Scripts

LAB 08

Offline Brute-Force

LAB 09

Online Brute-Force

LAB 10


LAB 11

Using Wireshark

LAB 12

Using Tshark

LAB 13


LAB 14


LAB 15

File Structure

LAB 16


LAB 17


LAB 18

Network Attacks

Scenario: NR001

During the World Cup in Romania, fans dream about finding affordable tickets. This summer, according to the Federal Trade Commission, scammers are duping fans with phishing emails that include enticing, but fake, free trips to Romania. The research discovered a large number of phishing emails, and they require your assistance to investigate them.


Scenario: NR002

A network administrator of a big company suspects that an employee was tricked by a scam email, in which he accidentally downloaded a Trojan malware.


Scenario: NR003

An advanced group of hackers has been recently spotted to be sending a vast amount of phishing mail addresses, successfully hacking a large number of top executives. One of the hacked companies suspects that even after mitigating the issue, a backdoor is present and alive at the system.


Scenario: NR004

German police are seeking your help in gathering information related to the IP address that could lead to the cell phone device used by a DHL blackmailer whom last year parceled out bombs at different addresses in Brandenburg and Berlin.


Scenario: NR005

Recently a large credit card company had a large data breach. The credit card database was hacked, stolen, and leaked to the DarkNet. Now, the company requested your firm’s assistance on finding the attackers and mitigating the leak, use your forensics knowledge to solve the data leak.


To be eligible for the certificate, the student must complete four scenarios (out of five) and submit the project associated with the course.

Score distribution: 60% scenarios + 40% project.

Network Research Certification

What our students say

"It was a challenging and interesting hands-on training."

"The simulation scenarios were well crafted, most were based on real-life cases."

  • White LinkedIn Icon
  • White Facebook Icon

Ze'ev Jabotinsky St 7,
Ramat Gan, IL.

© 2020 by ThinkCyber