Information Technology

Intermediate Network Traffic Analysis: Cybersecurity Labs Powered by Hack The Box

Learn how to monitor, analyze, and interpret network traffic to identify malicious activity and anomalies across the link, network, and application layers. Using Cybersecurity Labs powered by Hack The Box, you’ll learn to detect link-layer attacks such as ARP spoofing, scanning, and DoS; spot wireless threats including rogue access points and deauthentication attacks; uncover network-level anomalies such as IP spoofing, TCP handshake irregularities, and covert channels; and analyze application-layer threats including HTTP enumeration, XSS, command injection, SSL renegotiation attacks, and suspicious DNS, Telnet, and UDP traffic.

This course is for security analysts, network defenders, penetration testers, and anyone responsible for monitoring, securing, or investigating network traffic for potential threats.

Prerequisites

  • Networking fundamentals
  • Web Request fundamentals
  • Linux fundamentals
Learn More