Hands-on Network security basics
$34.99
Shop on Udemy

Description

NEXT update (subject to change): DNS tunneling, SSH intercept, SMPT file carving with ScapyDisclaimerAll videos, tutorials and attachments are for informational and educational purposes only. All videos have been made using my own resources in closed, isolated environment. I do not promote, encourage, support any illegal activities. The author will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this course to break the law. Hands-on Network Security BasicsThis course is essential training for someone who wants to learn network security. Everything in this course is based on real-world questions that I collected /arranged for days one, two, or three of network security training. So even if you think this course is too easy, you can still use this as training material for your team. Also, I put priority on dealing with time-tested attack vectors that constantly revive. Threats would not suddenly come alive. Instead, most of them were remodeled and disguised as new.     [contents at a glance (*contents will updated/added without prior notice)]ARP traffic investigation + Datalink layerRouting/ packet filtering challenge+Network layerHTTPS decryption/ interception+ Trans-App layerWeb Application Firewall+ Wrap up practiceVPN fundamentals (ssh tunneling/split-tunneling)+  Trans-App layerLogs and security device config files analysis+  Python ttp and Jinja2: convert semi-structured data to 2 dimensional dataset[how I made this course:]collected half-answered or unanswered network security-related questions from famous tech QA sites, security vendors' community sites and Github issues. picked easy to intermediate onesmade complete answers to them (really time-consuming!)arranged QAs so we can replicate the issues individually (insanely time-consuming!)intended audience: Software developers who usually don't handle NW security problemsCustomer Success engineers who want to analyze NW security problems quickly in an isolated environmentNW engineers who are having a hard time understanding weird NGFW UTM /Sandbox alertswhat we're going to do: Generate malicious traffic using popular tools and feed that traffic to pcap analysis tools to see how they analyze the traffic. Play with Brim ( pcap analysis tool powered by Zeek and Suricata with SEIM-like searching interface). learn practical network layering for troubleshootingcode Python scapy to analyze layer two attacksolve real-world routing/filtering issues in Docker environmentanalyze typical covert tunneling methodologies[history]2022/06/17  Working on fixing subtitles.2022/07/04 Fixed subs. 

logo

Udemy