Essential Defender 201: Network Monitoring Fundamentals
- Duration: 8 hours
- Delivery Options: Online, In-person
ED-201 lays the foundational layer of cyber defense with the understanding of communication methods used by attacks. You will learn about firewalls and packet captures through lecture materials and three real-world cyberattack scenarios on the Purdue Cyber Range.
Who should take this course
ED-201 is designed for professionals starting cyber and information security. It is recommended for those who either have completed A.C.E.-Core or with networking experience.
How can you take this course
Available online live with an instructor
Available in-person either at Purdue or at your location.
What tools you will use
This course introduces participants to industry tools such as Palo-Alto Firewall and WireShark.
What you can expect from Essential Defender 201: Network Monitoring Fundamentals
The first step in stopping an attacker is understanding how they communicate through networks. ED-201 teaches you an understanding of network traffic and its flow through firewalls and packet capture. Participants are tasked with identifying three cyberattacks by only seeing the attack traffic in the firewall or packet capture. While the course is only scoped to identifying a cyberattack, the range instructor will provide suggestions for recovery and remediation in a limited capacity.
- Upskill current workforce
- Get hands-on with industry tools in virtual labs.
- Perfect for I.T. team expanding responsibilities
- Gain an understanding of network traffic.
- Learn industry tools in virtual labs.
- Taught remotely or in-person
While ED-201 is recommended for teams, it can be taken as an individual. The course is taught through three instructor-led Purdue Cyber Range attack scenarios over the course of a day.
Purdue Cyber Range is a virtual testing ground that allows individuals and teams to experience both defensive and offensive cyberattack scenarios. Each scenario is overseen by a Range Master, ensuring your team's experience is as educational as possible.
Network Traffic: Understand and monitor network traffic for indicators of compromise.
Incident Response: Understand the foundations of identifying, containing, and recovering from a cyber attack.
It is recommended that all of cyberTAP courses be taken on a laptop or PC that runs either Windows or Linux as an operating system. We also recommended to have a fast and reliable internet access.
Are you interested in learning more?
cyberTAP's comprehensive approach to teaching cyber fundamentals and building practical skills through applied technical training is perfect for those interested in starting a new career, learning a new skill, experiencing a cyberattack firsthand, or making a team around cybersecurity. Our programs are fully customizable to offer a tailored solution for individual and corporate needs. Let's get in touch and see just how cyberTAP can partner with you and develop a training program just for you and your team.