Network scanning is performed by malicious users and IT security professionals. In this course, Network Monitoring and Analysis, you'll learn the fundamental knowledge of common network scans run by attackers so that you can detect this activity. First, you'll explore attack signatures, network monitoring techniques, and OS fingerprinting. Next, you'll learn about common TCP and UDP scan types and how ARP poisoning allows attackers to funnel traffic through their stations. Finally, you'll learn how to use the free, open source, Wireshark network analyzer to capture and analyze network traffic. When you're finished with this course, you will have the skills and knowledge of network monitoring needed to detect and protect against attackers.
Learning Objectives
- Monitoring Network Activity
- Identifying Suspicious Network Activity
- Monitoring Network Activity Using Wireshark
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Cyber Defense Infrastructure Support
- Network Services