1,600
ZX305 – Network Security
Valid for 6 months
*Typical completion, beginning to end: 6-9 months, when studying regularly
Network Security
Secure complex network infrastructures
A foundational course that introduces learners to fundamental concepts of cybersecurity, digital networking, and security landscape.
Series
ZX Offense
Program Code
ZX305
Duration
Self-Pace*
*Typical completion, beginning to end: 6-9 months, when studying regularly
Description
In this program, learners will explore various network and organizational domain security weaknesses using diverse network hacking strategies. This exploration helps them understand potential vulnerabilities and how to counteract them.
What Our Clients Say
“Over 1000 of our students have been trained using ThinkCyber's Products and Services. The hands-on experience they gain from using the Cyberium Arena Simulator and Specto is invaluable and has been instrumental in their career progression”
— John Bryce Training Center, Israel
“The training was crucial, providing my team with a wealth of knowledge through hands-on experiences. This is why, throughout June 2023, we will be welcoming SOC analysts from across the nation to participate in the CACC (CERT-IL Advanced Cyber Training). This training, facilitated by ThinkCyber and utilizing the Cyberium simulator, will provide invaluable experience and knowledge upgrades.”
— Homeland Security
“Our students are getting excellent positions such as SOC Analysts, Network Security Engineers, Forensics and Penetration Testers thanks to the applicable and relevant hands-on cybersecurity skills they've acquired through ThinkCyber's solutions.”
— James Lim, CEO of Centre for Cybersecurity Institute, Singapore
“Exceptional course! I've attended numerous programs, but this outshines them all in every conceivable way: the comprehensive content, the expert guidance, the practical exercises, and the seamless organization of the entire course.”
— Defense Forces
Program Recognition & Impact
This foundational program has been a cornerstone of cybersecurity training worldwide:
-
Trusted by military and law enforcement agencies for entry-level cyber training
-
Adopted by homeland security organizations for foundational cyber education
-
Used extensively in universities and corporations across multiple countries
-
Proven track record with over [X] professionals trained globally
Real-World Training Environment
From day one, you'll work in our Cyberium Arena simulator:
-
Hands-on practice with real networking tools
-
Safe environment to explore cybersecurity concepts
-
Industry-standard command line interfaces
-
Actual network monitoring and analysis tools
* Advanced threat scenarios with Specto-AI become available from Level-2 onwards
What You Will Learn
In this program, learners will explore various network and organizational domain security weaknesses using diverse network hacking strategies. This exploration helps them understand potential vulnerabilities and how to counteract them.
Network Security
This module explores various attacking frameworks, providing an invaluable perspective on potential cyber threats. This knowledge helps learners to identify and address network vulnerabilities effectively.
-
Network Security Fundamentals
-
Principles of Network Security
-
Packet Tracer
-
Subnetting
-
Network Protocols
-
DHCP
-
SMB, SMB2
-
LLMNR
-
NBNS
-
Frameworks
-
Enumeration
-
Exploitation
-
Pass-The-Hash (PTH)
-
Responder
-
Collecting Information
-
Cracking Passwords
-
In this module, learners gain a comprehensive understanding of domain setup, including critical domain protocols and how they function. Moreover, it also covers domain events, providing insights into the various activities that can occur within a domain. This knowledge equips learners to manage and secure network domains effectively.
-
Domain Setup
-
Domain Installation
-
Domain Services
-
Domain Protocols
-
Kerberos
-
LDAP
-
Domain Events
-
This module focuses on the extensive capabilities of PowerShell in managing a Windows environment. It guides learners through essential PowerShell commands and illustrates methods for efficient enumeration.
-
PowerShell Commands
-
PowerShell Text Manipulation
-
PowerShell Event Logs
-
PowerShell Enumeration
-
This module begins by scanning techniques to identify vulnerabilities, followed by enumeration methods for further probing. The course then delves into exploitation techniques to leverage these vulnerabilities and finally explores post-exploitation tactics.
-
Scanning
-
Enumerating
-
Rpcclient
-
Exploitation
-
Msfconsole
-
Impacket
-
CrackMapExec
-
Post Exploitation
-
Mimikatz
-
PSexec
-
Golden Tickets
-
Domain Security
-
This module imparts knowledge of encryption techniques used in cybersecurity.
-
Encryptions
-
Classic Encryptions
-
Modern Encryptions
-