Network Monitoring and Reconnaissance Package

Provided by

Enquire about this course

Overview

Once your network is set up securely, you must continue to be vigilant. Whether it be an innocent user;s risky behaviour or an actual break-in, it is the IT professional;s responsibility to know what is happening on their network. Labs in this category explore how to identify systems on a network and the services they provide either intentionally, through misconfiguration, or by malicious action.

This package includes all labs in the Network Monitoring and Reconnaissance category, as well as all new labs in the category released during your subscription period. The MITRE ATT&CK Matrix is a taxonomy of adversary tactics and techniques, including detection and mitigation techniques for each. These techniques are aligned as appropriate to CYRIN exercise lab packages.

Prerequisites

Specific prerequisites vary by lab, but generally include basic knowledge of TCP/IP networking, network setup principles and Linux command line.

Objectives

All CYRIN labs, exercises and attacks happen within a virtual environment. Each trainee or student gets their own virtual instance of a lab, exercise or attack, allowing training to be self-paced and available anywhere at any time. In order to meet specific training objectives, CYRIN subscriptions are sold on a packaged basis. That is, groups of CYRIN labs, exercises and/or attacks are recommended and bundled to meet the individual needs of the student.

Network Monitoring and Reconnaissance Scenarios Package:

EXPECTED DURATION
  • 12 hours, self-paced. Pause and continue at any time.
  • 12 CPEs awarded on successful completion.
  • 6 months of access.
EXERCISE PACKAGE SCENARIO BASED LABS CONTENT

1. Identifying Live Machines and Services on an Unknown Network

Students will use tools such as nmap, unicornscan, and fping to identify systems on a local network, including both Unix and Windows targets. Students will identify the operating systems these systems are running, as well as the types of network services they are providing.

2. Service Identification I

Students will use multiple tools to identify services, including software package and version information, running on unknown systems. Network services to be targeted will include those running on non-standard ports or behind firewall rules.

3. Service Identification II

Students will build on the Service Identification I exercise to use service-specific information-gathering tools. Students will gather vendor, software, and version information, as well as any configuration information available remotely. Students will then use scripting tools to automate this process.

4. Log Analysis with RSYSLOG

This scenario-based lab teaches students to setup and configure a central RSYSLOG server that will receive and store logs from FreeBSD, Linux and Windows clients.

Students will learn to configure log forwarding on the clients, and log rotation and filtering on the server. They will also learn to use Logwatch to analyse logs and fail2ban to automatically respond to suspicious activity found in the logs.

5. Log Analytics with Splunk

In this scenario-based lab the student will learn how to configure and securely run the Splunk Enterprise security information collection and analysis platform. The objective of the lab is to deploy multiple instances of Splunk data forwarders through a deployment server and analyse the logs received from the servers. The student will write custom scripts to generate logs, create both visual and textual reports, organise these reports into a single dashboard, and learn to recognise malicious activity.

6. Log Analytics with Elastic Stack

Elastic Stack is a group of services designed to take data from almost any type of source and in almost any type of format, and to search, analyse and visualize that data in real time. In this scenario-based lab, Elastic Stack will be used for log analytics. Students will learn to set up and run the Elasticsearch, Logstash and Kibana components of Elastic Stack. Multiple computers in a small network will forward their logs to a central server where they will be processed by Elastic Stack. Student will use Kibana to view logs, filter them and set up dashboards. Information in the logs will be used to identify and block an on-going attack.

NIST NICE FRAMEWORK

All of the CYRIN exercise labs are mapped to the NIST NICE Framework - Specialty Areas:
  • Vulnerability Assessment and Management (VAM)
  • Cyber Defence Infrastructure Support (INF)
  • Systems Administration (ADM)
CYRIN training is sold on a subscription basis. All CYRIN subscriptions come with two free labs: "Getting Started with CYRIN" and "Web application Security Analysis using OWASP-ZAP". All new CYRIN courses that are added to the training platform during a subscription period will be made available to subscribers at no additional cost.

Enquire

Start date Location / delivery
No fixed date United Kingdom Book now
01132207150 01132207150

Related article

Read the latest edition of Cyber Pulse: Law enforcement takes down global cybercrime VPN services Safe-Inet; European Medicines Agency Covid-19