Course Outline

Turn Off Unnecessary Services

Flood Ping

Sniffing

  • Sniffit
  • Ettercap
  • Tcpdump

Network Monitoring

  • Scanning ports (nmap, nessus)
  • LAN traffic monitor (iptraf)
  • Monitoring changes in Ethernet network interface cards and IP numbers by users (arpwatch)
  • Dump traffic on a network (tcpdump)

Logging Packets

  • Log packets from the use of mechanisms NetFilters and iptables
  • IP Protocols Logger (ippl)

Firewall (Based on NetFilters and Iptables)

  • Packet path through the filters
  • Create your own chains

Proxies

  • WWW Proxy (Squid)

Cryptography

  • SSLwrap
  • SSH and SCP
  • SSH Tunnelling

Spoofing

  • Obtaining information about the owner of the IP address and domain
  • Alerting authorities of a breach of the law
These tools and techniques are essential for government agencies to ensure robust network security and compliance with public sector workflows, governance, and accountability.

Requirements

Understanding of any Unix-like operating system and the fundamental architecture of TCP/IP networks for government use.

 14 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories