Module #1 Introduction to Network Exploitation and Defense Overview of network exploitation and defense, importance and relevance in todays cyber security landscape
Module #2 Network Fundamentals Review of network protocols, devices, and architectures
Module #3 Networking Tools and Technologies Introduction to networking tools such as Nmap, Nessus, and Wireshark
Module #4 Vulnerability Assessment and Management Understanding vulnerability assessment, scanning, and management techniques
Module #5 Network Reconnaissance Techniques for gathering network information, including DNS reconnaissance, network mapping, and OS detection
Module #6 Scanning and Enumeration Port scanning, OS detection, and service enumeration techniques
Module #7 Exploitation Fundamentals Introduction to exploitation techniques, including buffer overflows and SQL injection
Module #8 Windows Exploitation Exploiting Windows systems, including Windows XP, Windows 7, and Windows 10
Module #9 Linux Exploitation Exploiting Linux systems, including Ubuntu, Debian, and CentOS
Module #10 Web Application Exploitation Exploiting web applications, including SQL injection and cross-site scripting (XSS)
Module #11 Wireless Exploitation Exploiting wireless networks, including WEP, WPA, and WPA2
Module #12 Network Defense Fundamentals Introduction to network defense, including firewalls, IDS/IPS, and access control
Module #13 Network Segmentation Implementing network segmentation to prevent lateral movement
Module #14 Firewall Configuration and Management Configuring and managing firewalls to prevent unauthorized access
Module #15 Intrusion Detection and Prevention Systems (IDS/IPS) Implementing and configuring IDS/IPS systems to detect and prevent intrusions
Module #16 Access Control and Authentication Implementing access control and authentication mechanisms to restrict access to network resources
Module #17 Incident Response and Containment Responding to and containing network incidents, including incident response methodologies and tools
Module #18 Network Forensics and Analysis Analyzing network traffic and logs to identify and respond to incidents
Module #19 Network Security Monitoring Monitoring network traffic and logs to detect and respond to security threats
Module #20 Cryptographic Techniques for Network Security Using cryptographic techniques to secure network communications, including SSL/TLS and VPNs
Module #21 Secure Network Architecture Designing and implementing secure network architectures, including DMZs and VLANs
Module #22 Network Security Policy and Compliance Developing and implementing network security policies and complying with regulations
Module #23 Network Exploitation and Defense Tools Hands-on practice with network exploitation and defense tools, including Metasploit and Snort
Module #24 Course Wrap-Up & Conclusion Planning next steps in Network Exploitation and Defense career