top of page

1,600

ZX305 – Network Security

Valid for 6 months

*Typical completion, beginning to end: 6-9 months, when studying regularly

Network Security

Secure complex network infrastructures

A foundational course that introduces learners to fundamental concepts of cybersecurity, digital networking, and security landscape.

Series

ZX Offense

Program Code

ZX305

Duration

Self-Pace*

*Typical completion, beginning to end: 6-9 months, when studying regularly

Description

In this program, learners will explore various network and organizational domain security weaknesses using diverse network hacking strategies. This exploration helps them understand potential vulnerabilities and how to counteract them.

What Our Clients Say

John Bryce.jpg
“Over 1000 of our students have been trained using ThinkCyber's Products and Services. The hands-on experience they gain from using the Cyberium Arena Simulator and Specto is invaluable and has been instrumental in their career progression”

— John Bryce Training Center, Israel

HLS Testomonial.jpg
“The training was crucial, providing my team with a wealth of knowledge through hands-on experiences. This is why, throughout June 2023, we will be welcoming SOC analysts from across the nation to participate in the CACC (CERT-IL Advanced Cyber Training). This training, facilitated by ThinkCyber and utilizing the Cyberium simulator, will provide invaluable experience and knowledge upgrades.”

— Homeland Security

James CFC Testimonial.jpg
“Our students are getting excellent positions such as SOC Analysts, Network Security Engineers, Forensics and Penetration Testers thanks to the applicable and relevant hands-on cybersecurity skills they've acquired through ThinkCyber's solutions.”

— James Lim, CEO of Centre for Cybersecurity Institute, Singapore

Army Testimonial.jpg
“Exceptional course! I've attended numerous programs, but this outshines them all in every conceivable way: the comprehensive content, the expert guidance, the practical exercises, and the seamless organization of the entire course.”

— Defense Forces

Program Recognition & Impact

This foundational program has been a cornerstone of cybersecurity training worldwide:

  • Trusted by military and law enforcement agencies for entry-level cyber training

  • Adopted by homeland security organizations for foundational cyber education

  • Used extensively in universities and corporations across multiple countries

  • Proven track record with over [X] professionals trained globally

Real-World Training Environment

From day one, you'll work in our Cyberium Arena simulator:

   

  • Hands-on practice with real networking tools

  • Safe environment to explore cybersecurity concepts

  • Industry-standard command line interfaces

  • Actual network monitoring and analysis tools

 

* Advanced threat scenarios with Specto-AI become available from Level-2 onwards

What You Will Learn

In this program, learners will explore various network and organizational domain security weaknesses using diverse network hacking strategies. This exploration helps them understand potential vulnerabilities and how to counteract them.

Network Security
  • This module explores various attacking frameworks, providing an invaluable perspective on potential cyber threats. This knowledge helps learners to identify and address network vulnerabilities effectively.

    • Network Security Fundamentals 

    • Principles of Network Security 

    • Packet Tracer

    • Subnetting

    • Network Protocols

    • DHCP

    • SMB, SMB2

    • LLMNR

    • NBNS

    • Frameworks

    • Enumeration

    • Exploitation

    • Pass-The-Hash (PTH)

    • Responder

    • Collecting Information

    • Cracking Passwords
       

  • In this module, learners gain a comprehensive understanding of domain setup, including critical domain protocols and how they function. Moreover, it also covers domain events, providing insights into the various activities that can occur within a domain. This knowledge equips learners to manage and secure network domains effectively.

    • Domain Setup

    • Domain Installation

    • Domain Services

    • Domain Protocols

    • Kerberos

    • LDAP

    • Domain Events

  • This module focuses on the extensive capabilities of PowerShell in managing a Windows environment. It guides learners through essential PowerShell commands and  illustrates methods for efficient enumeration. 

    • PowerShell Commands

    • PowerShell Text Manipulation

    • PowerShell Event Logs

    • PowerShell Enumeration
       

  • This module begins by scanning techniques to identify vulnerabilities, followed by enumeration methods for further probing. The course then delves into exploitation techniques to leverage these vulnerabilities and finally explores post-exploitation tactics.

    • Scanning

    • Enumerating

    • Rpcclient

    • Exploitation

    • Msfconsole

    • Impacket

    • CrackMapExec

    • Post Exploitation

    • Mimikatz

    • PSexec

    • Golden Tickets

    • Domain Security
       

  • This module imparts knowledge of encryption techniques used in cybersecurity.

    • Encryptions

    • Classic Encryptions

    • Modern Encryptions
       

bottom of page