The Network Packet Analysis (NPA) course starts with the fundamental networking basic concepts, networking methodologies. This course will drive you into necessary software tools to analyze network data packet traffic for the purpose of intrusion and threat detection, network defense and primarily to identify offensive operations by attackers.
NPA is an outstanding industry standard training program for participant who are interested in analyzing traffic to learn how a program or application works using network, or determining if a networked device is infected with malware or intruders. If you perform incident response or are involved with investigations, this course will help you take your skills to the next level. Wireshark will be used as the primary analysis tool.
Wireshark® is an open source Network Packet Analyzer for analyzing the TCP/IP communications. The participants will experience the use of Wireshark to identify problems in TCP/IP communications. At the end of the workshop, all the participants will have practical knowledge of how to use Wireshark efficiently to analyze and trouble shoot network performance problems.
All our consultants are senior professional with tremendous exposure to Information Security and Governance Risk & Compliance. With over a decade of experience in training & consulting, they help bring a lot of practical and industry relevant examples with case studies to the classroom which improves the overall learning experience. Our professional hold industry acclaimed accreditation such as : Phd , M.S , CISSP, CHFI, CISA, CISM, CEH, ISO 27001 LI / LA, CCNP, CWNA , MCSE & ITIL.
infySEC IS Lab is an extreme Online Virtual Remote Lab provided to participants where they can work from any place at any point of time without restriction. ISLab provides login privilege to Network Packet Analysis participants where they can work in our Virtual Remote Server and start doing their Labs.
Our ISLab was created in such a concept called “Learn with Fun” where each participant will face gaming-like structured online hacking program called 'Live Hacking Zone' which contains many Levels relevant to the topics covered on the program. Each participant has to cross levels to face NPA exam, Hence NPA will only deliver equipped candidates. Participant have to cross multiple Levels starting with easy to toughest level. Each participant can track other participants activity live which helps each participants to get involved into Live Hacking Zone competition, Prepare to be SHOCKED, ENTERTAINED and EDUCATED all at the same time.
Please bring your own laptop loaded with Wireshark to class. You may download Wireshark for free at www.wireshark.org.
1. Binding interface to Analyzer, Capture Traffic to/from the Hardware Address using the Ring Buffer method and Capture filter method.
2. Capture traffic on Cabling system and save it to the Disk
3. The Navigation methods, locating strings in a Trace File
4. Set Time Display format and trace delays in the packet transfer process.
5. Capture and Analysis of ARP packets. ARP Padding, Layer 2 Broadcast identification, Need for L2 broadcasting, Encapsulation process, Analysing ARP Payload
6. Capture ICMP traffic and analyse the packets for Type number and Code number of the ICMP packet captured.
7. Unusual ICMP packets. Capturing TTL manipulated packets and Anaysis (Tracert). TTL expired in Transit, Type 3 Code 3 Packet Analysis
8. Filter the traffic with specific Parameters.
9. Understand the Status bar while capturing and filtering the packets.
10. Capture / Open Trace files and Find, Mark, Save, and Colorize Packets
11. Capture live packets. Filter the traffic using display filters. Use various display filter parameters and analyse.
12. Capture and analyse DHCP DORA process packets, Analyse the DHCP Error Message packet, Leasing Parameters.
13. Installation of DNS Server, Creating zone and resource records, Capturing the DNS Traffic, Analyse DNS Query & Response, Unusual DNS packets and Filtering packets based on DNS parameters.
14. Capture and Analyse the Network Layer Header, Source IP, Destination IP, Time difference between the request and response, IPV4 parameters.
15. Capture UDP Traffic. Analyse source port and destination port. Filtering on UDP destination port parameters.
16. Capture the packets of TCP 3 way handshake and analyse the Sequence numbers, Port numbers, Acknowledgement numbers and understanding relative sequence numbers configuration.
17. Analysing each parameter in the TCP Flags. Filtering TCP packets based on flag parameters / Values.
18. Capture and Analyse HTTP packets, the Source IP, Destination IP, Source and Destination Port numbers, packet fragmentation details, Reassembly of packets, size of the fragment. Capture and Analysis of SSL encrypted (HTTPS) Traffic
19. Capture and analysis of FTP Traffic, the Control Connections and Data connection handshakes. Identify a Clear Text Password in FTP Traffic and the TCP handshake and tear down process for FTP traffic.
20. Retrieving the downloaded file using Trace file.
Good understanding of basic network concepts and TCP/IP fundamentals. You should know the purpose of a switch, a router, and a firewall. You should also be familiar with the concepts of Ethernet networking, basic wireless networking, and be comfortable with IP network addressing.
The content of infySEC syllabuses is regularly updated to ensure that it remains relevant and reflects the latest thinking in par with the scenario of current technology . However, as part of the latest review, the documents themselves have been given a fresh design.
FLOW OF NETWORK PACKET ANALYSIS COURSE
S.No: | Topics |
1 | Introductory Analysis of TCP/IP communications |
2 | TCP and UDP communication parameters |
3 | The Wireshark Architecture |
4 | Traffic capturing techniques and analyzer placement |
5 | Capture filters |
S.No: | Topics |
6 | Display Filters |
7 | Coloring rules, graphing, field interpretations, and functionality of key TCP/IP communications |
8 | Packet structure of ARP, ICMP, DNS, IP, TCP, UDP, HTTP, HTTPS (SSL) traffic |
9 | Service refusals |
10 | TCP and UDP behavior towards Open/Closed ports |
Please bring your own laptop loaded with Wireshark to class. You may download Wireshark for free at www.wireshark.org.
1 | Introduction to Network Analysis and Wireshark |
|
|
2 | Analysis of Protocol Structure |
|
|
3 | Create, Apply Filters and Filter Expressions |
|
|
4 | Follow TCP Streams and Reassemble Data |
|
|
5 | Troubleshooting and Analysis |
|
NPA Course fee
Rs.18,000 Nett
Deliverables includes
NPA User Friendly DVDs
It Is Mandatory That You Get Proper Written Permission From Your Organization Before Using Our Course Software, Tools And Techniques On Your Company Networks And Systems For Any Sorts Of Testing Or Services You Lend. If You Are Planning For Any Kind Beneficiary Security Testing Inside Your Organization, It Is Advised To Intimate Your Network And Computer Operations Teams In Written Form Before You Start Any Testing. If You Are Planning For Any Kind Beneficiary Security Testing For Your Clients, It Is Advised To Sign An Non Disclosure Agreement From The Respective Stakeholders In Written Form Before You Start Any Testing.
In Depth HandBook Guide
Each page in course HandBook has been carefully designed with intense care and necessary relevant screenshots included for participant easy understanding.Also this handbook will not be available in local market or book publishing houses.
NPA Course CertificateYou will receive a infySEC Certificate of Completion upon successful completion of our NPA training program.
What Is needed To participate during Training Period ?
Mode of registration
1. Online fund Transfer
2. Cash payment in training office.