×
Phoenix TS

Packet Capture Analysis – Level 1

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Course Overview

This 5-day instructor-led course offers a comprehensive and hands-on introduction to PCAP analysis, designed for cybersecurity professionals, network administrators, and IT security analysts. Participants will delve into the fundamental components of the TCP/IP protocol, compare IPv4 and IPv6, and explore advanced network routing techniques.  

Through practical lab exercises, students will apply session analysis techniques, evaluate IPsec network traffic, and understand packet filtering methods. The course also covers hacking methodologies, advanced attack components, and custom packet creation, equipping participants with the skills needed to detect and analyze sophisticated cyber threats effectively. By the end of this immersive training, participants will be proficient in network traffic analysis and prepared to tackle real-world cybersecurity challenges. At the completion of this course, participants will be able to: 

  • Understand the components and characteristics of TCP/IP at the lowest level. 
  • Compare IPv4 to IPv6 protocols. 
  • Determine routes and IP routing on a network. 
  • Apply session analysis techniques to network traffic. 
  • Evaluate IPsec network traffic and understand packet filtering techniques. 
  • List the steps of a hacking methodology. 
  • Perform analysis of hacking techniques and tools. 
  • Understand the components of advanced and sophisticated attacks. 
  • Create and customize their own packets to confuse and evade detection and observation. 

Schedule

Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.

Course Outline

Module 1: TCP/IP Protocol Fundamentals

Introduction to TCP/IP

  • Overview of the TCP/IP model
  • Detailed breakdown of each layer

Components and Characteristics of TCP/IP

  • Understanding packet structures
  • Examination of headers and payloads

Module 2: IPv4 and IPv6 Comparison

IPv4 Fundamentals

  • Addressing and subnetting
  • Header format and analysis

IPv6 Fundamentals

  • Addressing and subnetting
  • Header format and analysis

Comparing IPv4 and IPv6

  • Key differences and implications
  • Transition mechanisms

Module 3: Network Routing and IP Routing

Routing Basics

  • Understanding routing tables
  • Static vs. dynamic routing

IP Routing

  • Routing protocols (RIP, OSPF, BGP)
  • Route determination and path selection

Module 4: Session Analysis Techniques

Introduction to Session Analysis

  • Definition and importance of session analysis
  • Tools and methodologies

Analyzing Network Traffic

  • Identifying and tracking sessions
  • Practical lab exercises

Module 5: IPsec and Packet Filtering

Understanding IPsec

  • IPsec fundamentals and architecture
  • Use cases and practical applications

Packet Filtering Techniques

  • Firewalls and access control lists (ACLs)
  • Deep packet inspection (DPI)

Module 6: Hacking Methodologies and Techniques

Hacking Methodology Overview

  • Phases of a hacking attack
  • Reconnaissance to exploitation

Analysis of Hacking Techniques and Tools

  • Common tools used in attacks
  • Lab exercises on tool usage and detection

Module 7: Advanced and Sophisticated Attacks

Components of Advanced Attacks

  • Understanding APTs (Advanced Persistent Threats)
  • Case studies and real-world examples

Sophisticated Attack Techniques

  • Evasion and obfuscation methods
  • Advanced malware and exploit analysis

Module 8: Custom Packet Creation and Modification

  • Introduction to Custom Packet Creation
  • Tools and software for packet crafting

Basic packet creation techniques

  • Packet Modification for Obfuscation
  • Techniques for modifying packets
  • Lab exercises on evasion and detection

Conclusion

  • Review and summary of key concepts
  • Final assessment and practical exam
  • Q&A and further resources for continued learning

Course Audience

This course is intended for:

  • Cybersecurity Professionals
  • Network Administrators
  • IT Security Analysts
  • Incident Response Team Members
  • Ethical Hackers and Penetration Testers
  • Cybersecurity Students
  • Security Enthusiasts

Prerequisites:

  • A solid understanding of basic networking concepts.
  • Familiarity with the OSI and TCP/IP models.
  • Basic knowledge of IP addressing and subnetting.
  • Experience with network protocols and packet-level communications.
  • Prior exposure to cybersecurity principles and practices is beneficial but not required.

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org

Subscribe now

Get new class alerts, promotions, and blog posts

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Download Course Brochure

Enter your information below to download this brochure!

Name(Required)