Network Traffic Analysis

White image with gray geographic symbols
Cybersecurity Discipline Icon
Cybersecurity Discipline:

Network Traffic Analysis

This Mandiant course provides hands-on, tactical experience with network protocols, network architecture, intrusion detection systems, network traffic capture and traffic analysis. Reinforce technical concepts through self-paced virtual labs, where you’ll study the types of network monitoring and tools used to identify malicious network activity and prevent sophisticated attackers from blending seamlessly with legitimate traffic. Explore the most useful techniques for investigating botnets and how to utilize honeypots in network monitoring.

4 modules (self-paced)
Next Start
Continuous Enrollment

Installment payments are now available on all course purchases!

Knowledge Areas

Network traffic monitoring
Network traffic analysis
Incident response process
Event-based monitoring
Snort rule strucure
Custom rule creation
Computer monitor icon with blue arrow

100% Online

Geometric clock icon

No Mandatory Login Times

List icon with blue check marks

4 Modules

Paper icon with blue pencil

4-6 Work Hours Per Module

digital badge for Network Traffic Analysis from EmergingEd powered by FireEye

Digital Badge

Jessica Hays

Your Subject Matter Expert:

Jessica Hays

“The way I like to think of incident response is as if it's a jigsaw puzzle. Network Traffic Analysis makes up the outline pieces. Once you get an outline, you're able to fill in the actual image with host information.”

Course Modules

This cybersecurity course offers you a strong and thorough understanding of packet analysis through a foundation in network protocols and the tools and techniques used to analyze them. You will also learn about Snort signatures: how to develop them based on network indicators and how to set up rules to alert on them. Unique to this course are the four self-paced virtual labs paired with each instructional module, enabling students to practice network traffic monitoring in a simulated, risk-free environment using Kali Linux.

Module 1: Network Traffic Analysis, Linux Basics, Network Protocol Review, PCAP Analysis with Wireshark

Describe how Network Traffic Analysis is conducted throughout the attacker lifecycle. Review basic Linux commands and concepts. Conduct basic Wireshark analysis, such as using the dissector, display filter and the expression builder, setting user preferences, review common application protocols, and analyzing SSL traffic. Use the OSI TCP/IP model to determine what portions of the packet header are located at what layer.

Module 2: Attacker Techniques–DNS, HTTP, Lateral Movement, Binary Protocols

Analyze DNS protocol to include different types of records. Analyze HTTP traffic. Describe multiple protocols, what they look like on the wire, and their use in the attacker lifecycle. Analyze binary protocols.

Module 3: Network Sensor Placement, Network Flow Analysis, PCAP Analysis without Wireshark

Describe network hardware to include their uses and complications. Create a network topology. Conduct analysis using NetFlow and tools. Conduct analysis using non-Wireshark tools.

Module 4: Event-Based Analysis

Identify Snort rule options. Identify Surricata options. Create Snort signatures.

Ready to redefine your future?

Get started with EmergingEd today.

Jessica Hays

Jessica Hays is a Technical Instructor at Mandiant, a FireEye company. With 13 years of experience in the cybersecurity field, she has worked in a variety of capacities, including incident response and handling, but is currently specializing in cybersecurity awareness through proactive measures and threat intelligence. During her career, she has worked with multiple Fortune 500 and 1000 companies, along with various U.S. Government intelligence agencies.