Networking fundamentals: OSI/TCP‑IP models, IP addressing/subnetting, routing and switching.
Protocol deep‑dives: ARP, ICMP, DNS, DHCP, SMB, SNMP, SMTP/IMAP/POP, SSH, RDP, FTP, HTTP/S.
Discovery and scanning with Nmap: host discovery, port scanning, service/version detection, NSE scripts.
Traffic capture and analysis using Wireshark; validation with Netcat and banner grabbing.
Enumeration and initial access with Hydra, Responder, CrackMapExec, and Impacket tools.
Exploitation and post‑exploitation using Metasploit (payloads, exploits, post modules).
MITM and network manipulation with Ettercap/Bettercap; wireless attacks with Aircrack‑ng.
Android exploitation basics and mapping findings to OWASP Testing activities for networks.
Welcome to Cyber Allegiance's Network Security Training, a hands‑on program for students, ethical hackers, and IT professionals who want to assess and compromise networks securely in a lab setting.
This instructor‑led course is aligned with the OWASP Testing Methodology and maps network activities to OWASP categories such as Information Gathering, Configuration Management Testing, and Network Services Testing. You'll practice reconnaissance, enumeration, exploitation, and post‑exploitation on services like SMB, RDP, SSH, FTP, DNS, SNMP, HTTP/S, and wireless networks.
You'll work with industry tools such as Nmap, Wireshark, Netcat, Metasploit, Hydra, Responder, CrackMapExec, Aircrack‑ng, Bettercap, and Impacket to perform end‑to‑end assessments against lab networks.
By the end, you will complete a full‑scale network penetration test, pivot through subnets, capture and analyze traffic, and deliver a professional report mapped back to the OWASP Testing methodology. Labs, assignments, and guided exercises reinforce every stage.
Join Cyber Allegiance – and elevate your skills with a hands‑on, career‑focused Network Security training experience.
