After a detailed discussion of the TCP/IP suite component protocols and Ethernet operation, practice using various tools to capture, analyze, and generate Internet Protocol (IP) traffic.
Then explore the tools and techniques used to exploit protocol weaknesses and perform more advanced network attacks.
After building a thorough understanding of network based attacks, shift focus to the defensive solutions available.
Install, configure, and test one of the most popular and powerful Network Intrusion Detection Systems (NIDS) solutions available.
Finally, create a Linux based router / firewall solution, including advanced functionality, such as Network Address Translation (NAT), policy routing, and traffic shaping.
This course supports the latest versions of Red Hat Enterprise Linux, Fedora Core, SUSE Linux Professional, and SUSE Linux Enterprise Server.