Size: 544 MB

Description

The labs in this course are 100% hands-on and highly technical. Please be prepared to install and configure the necessary software to follow along. This will help you receive the maximum benefit of taking this course. The tools we will be using during this course are Wireshark, Tcpdump, Snort, Burpsuite, Nmap, Tcpreplay, Virtualbox and more. Operating Systems used will be Security Onion, Kali Linux, and Metasploitable. The operating systems and software utilized are all completely free, and can be run on one system using Virtualbox.

We’re also going to cover network security analysis with Wireshark and Tcpdump, intrusion detection system analysis with Snort and Squert, and ethical hacking and penetration testing with various tools on Kali Linux. The industry standard tools and methodology utilized in this course will expose you to hands-on skills that are necessary as a network security analyst, and cybersecurity professional in general. The quizzes include written questions, and a mock incident response report based upon findings.

Who this course is for:

  • Network Security Analysts
  • Security Analysts
  • Cybersecurity Students
  • Information Systems Security Students
  • IT Professionals
  • Cybersecurity Professionals

Requirements

  • Basic TCP/IP Knowledge
  • Basic information security knowledge
  • Basic knowledge about packet captures
  • Basic operating system knowledge (Windows, Linux)
  • Basics IDS knowledge
  • PC or Laptop
  • Virtualbox, Security Onion, Kali Linux, Metasploitable (Free and Open Source Operating Systems)

What you’ll learn

  • How to install and configure Virtualbox
  • How to install and configure Security Onion on Virtualbox
  • How to install and configure Kali Linux on Virtualbox
  • How to install and configure Metasploitable on Virtualbox
  • How to install and configure Wireshark
  • How to interpret Snort rules and analyze underlying packet captures
  • How to use Wireshark and Tcpdump to analyze malicious network traffic
  • How to use penetration testing / ethical hacking tools (Metasploit, Armitage, Burpsuite, Hydra, Nmap, etc.)

HOMEPAGE – https://www.udemy.com/course/network-security-analysis-using-wireshark-snort-and-so/

Download Links-

Note: Comment below if you find any link dead or getting problem in downloading files.

You May Also Like

Penetration Testing: Advanced Kali Linux
Hands-on Penetration Testing Labs 4.0
Marketing Tools: Digital Marketing
Categories: CoursesSecurity

0 Comments

Leave a Reply

Your email address will not be published. Required fields are marked *