This course will focus on the study of traffic analysis and the concepts of creating defensive measures based on analyst findings. This course covers collection of network traffic, analysis of individual packets, the setup and configuration of open-source intrusion detection systems (IDS), and the procedures required for Network Exploitation Analysts to be able implement a methodology to take traffic statistics, deployment of intrusion sensors and finally progress to the generation of reports utilized by management or administrators.
Understand Basic Network Setup
Understand How to Capture Network Traffic
Identify Various Network Analysis Tools
Explore Intrusion Detection System Setup
Analyze Network Traffic
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.