top of page

1,600

NX201 – Network Research

Valid for 6 months

*Typical completion, beginning to end: 6-9 months, when studying regularly

Network Research

Master network analysis techniques

Learn to investigate network security through hands-on practice with essential protocols, services, and security tools.

Series

NX Defense

Program Code

NX201

Duration

Self-Pace*

*Typical completion, beginning to end: 6-9 months, when studying regularly

What Our Clients Say

John Bryce.jpg
“Over 1000 of our students have been trained using ThinkCyber's Products and Services. The hands-on experience they gain from using the Cyberium Arena Simulator and Specto is invaluable and has been instrumental in their career progression”

— John Bryce Training Center, Israel

HLS Testomonial.jpg
“The training was crucial, providing my team with a wealth of knowledge through hands-on experiences. This is why, throughout June 2023, we will be welcoming SOC analysts from across the nation to participate in the CACC (CERT-IL Advanced Cyber Training). This training, facilitated by ThinkCyber and utilizing the Cyberium simulator, will provide invaluable experience and knowledge upgrades.”

— Homeland Security

James CFC Testimonial.jpg
“Our students are getting excellent positions such as SOC Analysts, Network Security Engineers, Forensics and Penetration Testers thanks to the applicable and relevant hands-on cybersecurity skills they've acquired through ThinkCyber's solutions.”

— James Lim, CEO of Centre for Cybersecurity Institute, Singapore

Army Testimonial.jpg
“Exceptional course! I've attended numerous programs, but this outshines them all in every conceivable way: the comprehensive content, the expert guidance, the practical exercises, and the seamless organization of the entire course.”

— Defense Forces

Description

Ready to dive deeper into networks and security? This program takes you from understanding core networking concepts to conducting actual security testing. You'll work with professional tools like Wireshark and Nmap, learn about network protocols and services, and discover how to identify vulnerabilities.

 

Perfect for those who understand the basics and want to build practical network security skills.

Program Recognition & Impact

Our Network Research program delivers methodologies proven in the most demanding security environments:

  • Trusted by military and law enforcement agencies 

  • Adopted by leading universities and corporations

  • Hands-on experience with professional security tools

  • Battle-tested approaches to network security challenges

  • Proven track record in government and private sectors

Real-World Training Environment

Through our Cyberium Arena learning platform, you'll interact with systems deployed on the live internet:

  • Use professional tools to analyze real network traffic

  • Investigate actual network services and protocols

  • Practice scanning and enumeration on live systems

  • Learn security testing in real network environments

What You Will Learn

The Network Research program is designed to introduce learners to the fundamental aspects of information security, employing Linux as a primary tool and providing exposure to various security threats.

NETWORK RESEARCH
  • This module provides an in-depth look into virtualization, focusing on Linux. It begins with an overview of virtualization and Linux distros, guides on Linux installation, and using VMWare. It addresses network configurations, Linux administration topics like directory structures, user management, packages, file manipulation commands, and concludes with scripting and automation in Linux.

    • Virtualization

    • Introduction to Virtualization

    • About Linux Distro

    • Installing Linux

    • Working with VMWare

    • Bridged vs. NAT

    • Working with Linux

    • Linux Directories

    • Linux Users

    • Packages

    • File Manipulation Commands

    • Text and File Manipulation Technics

    • Linux Scripts and Automation
       

  • This module offers a deep dive into key networking protocols and services. It starts by exploring the TCP/IP model, followed by detailed examinations of DNS, DHCP, and ARP protocols, then transitions into network services, providing insights into the workings of SSH, FTP, and the Apache web server. This comprehensive study of networking equips learners with crucial knowledge for managing and securing digital networks.

     

    • Protocols

    • TCP/IP Model

    • DNS

    • DHCP

    • ARP

    • Network Services

    • SSH

    • FTP

    • Apache
       

  • This module dives into network scanning and attack techniques. It starts with Nmap and Masscan, powerful tools for network scanning, then covers brute force and offline attack strategies. This course offers invaluable skills for network security testing.

    • Scanning

    • Nmap

    • Masscan

    • Brute Force

    • Offline Attacks

    • Creating Wordlists

    • Wireshark

    • Filtering and Parsing

    • Extracting Objects
       

  • This module delves into various network attacks and defense techniques. It covers Man-in-the-Middle (MiTM) and ARP Poisoning strategies, service brute-forcing, and analysis of cyberattacks. Learners are introduced to reverse and bind payloads, and hands-on training with Msfvenom and Msfconsole. Finally, it explores firewall operation, including port blocking and device monitoring, imparting critical skills for network security.

    • Network Attacks 

    • MiTM

    • ARP Poisoning 

    • Service Brute-Force

    • Analyzing Attacks

    • Cyber Attack

    • Reverse and Bind Payloads

    • Working with Msfvenom

    • Working with Msfconsole

    • Firewall

    • About Firewall Operation

    • Blocking Ports

    • Monitoring Devices
       

bottom of page