Network Traffic Analysis - Course Outline

Similar documents
Introduction to Troubleshooting TCP/IP Networks with Wireshark

Brief Contents. Acknowledgments... xv. Introduction...xvii. Chapter 1: Packet Analysis and Network Basics Chapter 2: Tapping into the Wire...

Part 1: Training Project Information (Required for Formal Quotes) Online Live On-Demand (All Access Pass Subscriptions) Other

Advanced Network Troubleshooting Using Wireshark (Hands-on)

CONTENTS IN DETAIL ACKNOWLEDGMENTS INTRODUCTION 1 PACKET ANALYSIS AND NETWORK BASICS 1 2 TAPPING INTO THE WIRE 17 3 INTRODUCTION TO WIRESHARK 35

NETWORK PACKET ANALYSIS PROGRAM

CompTIA Network+ Study Guide Table of Contents

CompTIA Network+ Outcomes. Lab Outline. Course Code N Released March Skill Level Intermediate. Duration 26 hrs

Wireshark 101 Essential Skills for Network Analysis 2 nd Edition

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

CompTIA Network+ N ucertify Labs. Course Outline. CompTIA Network+ N ucertify Labs. 10 Oct

Wireshark: Are You Under Attack? Kyle Feuz School of Computing

Course Outline. CompTIA Network+ N Pearson ucertify Course and Labs. CompTIA Network+ N Pearson ucertify Course and Labs

Network Security. Kitisak Jirawannakool Electronics Government Agency (public organisation)

Wireshark 101 Essential Skills for Network Analysis 1 st Edition

CompTIA Network+ N (Course & Labs) Course Outline. CompTIA Network+ N (Course & Labs) 14 Mar

The following virtual machines are required for completion of this lab: Exercise I: Mapping a Network Topology Using

Hands-On TCP/IP Networking

Wireshark 101 Course Set

High School Graduation Years 2016, 2017 and 2018

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Networking By: Vince

Understanding Networking Fundamentals

ETSF10 Internet Protocols Network Layer Protocols

University of Southern California EE450: Introduction to Computer Networks

Introduction to OSI model and Network Analyzer :- Introduction to Wireshark

ITdumpsFree. Get free valid exam dumps and pass your exam test with confidence

Computer Networks Security: intro. CS Computer Systems Security

SYLLABUS. Departmental Syllabus. Applied Networking I. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

PROTECTING INFORMATION ASSETS NETWORK SECURITY

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

CCNA Exploration Network Fundamentals

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE

IT Foundations Networking Specialist Certification with Exam

n Given a scenario, analyze and interpret output from n A SPAN has the ability to copy network traffic passing n Capacity planning for traffic

Radio over IP. Network Troubleshooting. IWCE 2019 Las Vegas Convention Center Las Vegas, Nevada

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

Implementing Cisco Network Security (IINS) 3.0

Fundamentals of Computer Networking AE6382

DKT 224/3 LAB 2 NETWORK PROTOCOL ANALYZER DATA COMMUNICATION & NETWORK SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK

TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE. Modified

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

Certified Vulnerability Assessor

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

ECE 697J Advanced Topics in Computer Networks

REQUIREMENTS TECHNICAL EXAM CHEAT SHEET

The ACK and NACK of Programming

Strategic Infrastructure Security

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Table of Contents. Contents iii

CHCSS. Certified Hands-on Cyber Security Specialist (510)

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

Course List. December 2010

Cisco Certified Network Associate ( )

TCP /IP Fundamentals Mr. Cantu

PRACTICAL NETWORK DEFENSE VERSION 1

Hands-On Hacking Techniques 101

Certified Penetration Testing Consultant

Microsoft Exam

Computer Security II Lab Network Security

F5 Networks F5LTM12: F5 Networks Configuring BIG-IP LTM: Local Traffic Manager. Upcoming Dates. Course Description. Course Outline

CompTIA Network+ Course

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

Fundamentals of Network Security v1.1 Scope and Sequence

2

Fundamentals of Linux Platform Security

Fundamentals of Linux Platform Security. Hands-On Network Security. Roadmap. Security Training Course. Module 1 Reconnaissance Tools

Network sniffing packet capture and analysis

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

LECTURE WK4 NETWORKING

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE

CCNA Routing and Switching (NI )

COURSE 20741B: NETWORKING WITH WINDOWS SERVER 2016

CONTENTS IN DETAIL INTRODUCTION

Chapter 7. Local Area Network Communications Protocols

ECE 435 Network Engineering Lecture 23

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Computer Networks COSC 6377 Lecture 1

TCP/IP THE TCP/IP ARCHITECTURE

Course Outline. Networking Essentials, Fifth Edition Pearson ucertify Labs.

Networking with Windows Server 2016

CCNA. Murlisona App. Hiralal Lane, Ravivar Karanja, Near Pethe High-School, ,

General Firewall Configuration

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

Course 20741B: Networking with Windows Server 2016

HP Load Balancing Module

Network Security. Thierry Sans

Understanding Cisco Cybersecurity Fundamentals

Assignment 2 TCP/IP Vulnerabilities

Certified Cisco Networking Associate v1.1 ( )

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

Pearson: Certified Ethical Hacker Version 9. Course Outline. Pearson: Certified Ethical Hacker Version 9.

MTA_98-366_Vindicator930

PND at a glance: The World s Premier Online Practical Network Defense course. Self-paced, online, flexible access

Table of Contents. Computer Networks and the Internet

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Transcription:

Network Traffic Analysis - Course Outline This course is designed for system/network administrations with an overall understanding of computer networking. At the end of this course, students will have a clear understanding of TCP/IP protocol stack and different application level protocols, as well as being able to capture live network traffic and perform various types of analysis on the captured traffic. Prerequisites: Students should be familiar with basic concepts of TCP/IP and IP addressing using IPv4 protocol and also should have basic understanding of Linux operating system in order to be able to use various tools and methods discussed in this course. 1

Module 1 - TCP/IP Primer (12 hours) This section is intended to be a crash course for TCP/IP protocol family and give an overall idea of TCP/IP working internals to the student - Fundamental Protocols o IP Protocol o TCP Protocol o UDP Protocol o ICMP Protocol o ARP Protocol - Application Protocols o DNS o DHCP o HTTP/HTTPS o FTP o SMTP/POP/IMAP o TELNET/SSH o H.323/SIP o RIP/OSPF/BGP o SMB/CIFS o SNMP - Protocol Security Here we will discuss the protocol weaknesses that are imposed by design or misuse of each protocol. Give the fact that most of protocols are designed back in 70s, there are some weaknesses that has been there for ages, and how they are addressed (countermeasures will be discussed later). Also importance of end to end encryption and end to end integrity checking is discussed here. 2

Module 2 - Network Security Primer (9 hours) - Internet Architecture Here we provide a blueprint of Internet infrastructure and where important protocols are used o How Routing works o How DNS infrastructure works o How NAT works o How Packet Filtering Firewall works o How Intrusion Detection / Prevention System works - Virtual Private Networks o Encryption Primer o Client / Server VPN o Site to Site VPN o Peer to Peer VPN o VPN Protocols IPSec PPTP/L2TP SSL VPN OpenVPN GRE/IPinIP Custom VPNs SSH as a VPN Protocol Combined VPN protocols - Network Security Tools Here we introduce a few important network security tools. Students would be able to use these tools to audit and improve network security on their network. - Basic tools: ping, dig, host, netstat, whois, traceroute Most people know these tools, but they don t know how, where and when to properly use them. Advanced tips will be provided on these tools. - nmap Using nmap to determine available services and what OS is running on a remote host - Nessus Finding vulnerable services on a remote host - Netcat Creating network connections and interacting with network protocols - Kismet / Aircrack-ng Scanning and auditing security of Wi-Fi networks as well as traffic decryption 3

Module 3 Traffic Capture and Analysis (21 hours) - TCPDUMP Capturing Live IP traffic - ngrep Using ngrep to filter out certain packets and find specific information in live network traffic - Wireshark Using wireshark for network analysis o Module 1: Overview Network Analysis Overview Wireshark & Ethereal Special Capture Hardware Installation and first capture o Module 2: User interface and Navigation View Panes Toolbar and Statusbar Decode and Hexview Column Configuration Searching in Tracefiles Using Display Filters Capture to Disk and Ring buffer Capture Capture Filters Open, Save, Export, Print for captured network data o Module 3: Additional Configuration and command line tools Name resolution: MAC, Network, Service GeoIP localization of IP addresses Colorization of packets with specific attributes TCP Protocol Reassembly for reconstructing content Wireshark Peculiarities: Checksum errors, wrong frame size readings Configuration profiles for keeping multiple settings Command line tools: tshark, mergecap, editcap, dumpcap o Module 4: Functions and Statistics Baselining the network Summary Statistics Endpoint List, Conversation List Protocol Hierarchy TCP Stream Graphs and Round Trip Time I/O Graph and Flow Graph The Wireshark Expert Service Respone Time Statistics o Module 5: Analysis Fundamentals Network, Server, Cient or Application Procedures to track down Problems Planning captures Point of Capture: HUB, SPAN 4

Response Time, Overhead, Throughput o Module 6: Troubleshooting Troubleshooting Bottom-Up vs. Top-Down Proving the Opposite Correcting Problems Typical Network Problems Overview Application Design Errors Application Types: Throughput, Transaction, Stream Performance Parameters Measuring Bandwidth Response Times, Delay TCP Turns 5