Course Curriculum

(W00) Course Instructions 00:00:00
W32M00 Pre-Course Materials FREE 00:00:00
Free introductory materials. Lab setup and initial instructions inside - free access, no login necessary (just click the link above)!
(W32M01) Module 1 Lecture 00:00:00
In the first lecture of the course we will stretch our legs in our freshly set up lab, see what we'll go up against, and have a first taste of Wireshark and packet captures.
(W32M02) VM links and instructions 00:00:00
This unit contains downloads for all virtual machines used in the labs. You will need these to perform exercises throughout the course.
(W32M03) Course VMs - Video Instructions 00:00:00
A video lecture with setup instructions for course VMs.
(W32M04) Module 1 Lab 1 00:00:00
In this lab we test a test website provided by the instructor. We play with enumeration, footprinting, discovering routes, and nmap.
(W32A01) Module 1 Lab 1 30, 00:00
(W32M05) Module 1 Lab 2: Attacking my website! 00:00:00
This lab is all about attacking the test website used in Lab 1. We'll use T50 and Wireshark, capture some packets and consider how we can defend the website.
(W32A02) Module 1 Lab 2: Attacking my website! 30, 00:00
(W32M06) Module 1 Lab 3: Bring me the new Messiahs! 00:00:00
In this lab we continue testing - this time the target is our Windows VM. We'll use ssl to attack and other tools to see the effects.
(W32A03) Module 1 Lab 3: Bring me the new Messiahs! 30, 00:00
(W32M07) Module 1 Lab 4: Don’t stop believing! 00:00:00
This lab uses an external setup, and your first task will be figuring out how to make it do exactly what you want. Then we'll connect with tsl and capture more packets!
(W32A04) Module 1 Lab 4: Don’t stop believing! 30, 00:00
Module 2
(W32M08) Module 2 Video 00:00:00
In this lecture we'll learn more tools that are necessary to investigate malicious traffic in networks.
(W32M09) Module 2 Lab 1 00:00:00
In this lab we'll play with Python scripts available online and check what they can do in our network.
(W32A05) Module 2 Lab 1 10, 00:00
(W32M10) Module 2 Lab 2: Scapy 00:00:00
In this lab we practice using Scapy to send packets - and then we capture them.
(W32A06) Module 2 Lab 2: Scapy 10, 00:00
(W32M11) Module 2 Challenge 1: Stochastic network traffic with persistent malicious file 00:00:00
In this lab we will perform a malicious attack using SET and netcat. We'll investigate what happens when someone tries to do that on our network, how it looks from the defense positions, and capture all trafic for further analysis.
(W32A07) Module 2 Challenge 1: Stochastic network traffic with persistent malicious file 10, 00:00
(W32M12) Module 2 Challenge 2 00:00:00
In this challenge we'll analyze the packets captured in the previous lab.
(W32A08) Module 2 Challenge 2 10, 00:00
Module 3
(W32M13) Module 3 Notes & Downloads 00:00:00
This unit gather all downloads needed for analysis in the course labs - mostly packet captures. You'll also find a handy cheatsheet here!
(W32M15) Cryptowall: Basic Analysis 00:00:00
In this video lecture we take a closer look at how we can analyze a CryptoWall attack by examining captured packets.
(W32M114) Module 3 Video - Inspecting Packets 00:00:00
In this lecture you'll learn all about what you can tell from looking at captured packets.
(W32M16) Module 3 Lab 1 - Analyzing Packets 00:00:00
In this lab we'll analyze and attack and take it apart, looking into what we can learn about how our network was infiltrated, all from a single packet capture.
(W32A09) Module 3 Lab 1 - Packet Analysis 30, 00:00
(W32M17) Module 3 Lab 2: The Arppoison Packet 00:00:00
This lab will ask you to perform analysis of a pcap file provided by the instructor. See if you can reconstruct how the attack went down!
(W32A10) Module 3 Lab 2: The Arppoison Packet 30, 00:00
(W32M18) Module 3 Lab 3 00:00:00
Here you'll practice your packet analysis skills. You'll see Aurora, CryptoWall, your own attacks, and a wild card - and you'll have
(W32A11) Module 3 Lab 3 30, 00:00
Module 4
(W32M19) Module 4 Lab 1: Getting acquainted with Snort 00:00:00
In this lab we'll set up Snort to watch over our network. You'll configure basic rules and make your setup as secure as possible.
(W32A12) Module 4 Lab 1: Getting acquainted with Snort 30, 00:00
(W32M20) Module 4 Lab 2: Testing your Snort configuration 00:00:00
So, you think you configured Snort correctly? In this lab you'll have a chance to see for yourself how it works when you test it.
(W32A13) Module 4 Lab 2: Testing your Snort configuration 30, 00:00
(W32M21) Module 4 Lab 3: Attacking your Debian machine 00:00:00
In this lab we'll test the Azazel rootkit on our Debian VM. We'll capture packets and see what it looks like when you're paying attention - and then we'll try coming up with a defensive strategy.
(W32A14) Module 4 Lab 3: Attacking your Debian machine 30, 00:00
(W32M22) Module 4 Lab 4: Experimenting with defensive strategies 00:00:00
In this lab we look back at what we've done so far and check how we can experiment with new defensive strategy ideas or evaluate the existing ones. We'll also take a look at how it's done elsewhere - time to bring out Securityonion!
(W32A15) Module 4 Lab 4: Experimenting with defensive strategies 30, 00:00
Final Exam
(W32Q01) Final Exam 00:10:00
TAKE THIS COURSE
  • Premium Subscription Only
  • UNLIMITED ACCESS
  • Course Certificate
593 STUDENTS ENROLLED

Who’s Online

Profile picture of mamak_kutty

Certificate Code

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013