Online Training Course

Network Monitoring & Scanning Tools

Understand Internet operations, virtual machines, network scanning, and vulnerability assessment with hands-on training using top network security tools.

Course Overview

As your organization expands with new, interconnected technologies and a growing decentralized workforce, maintaining network security is critical to effectively delivering services and protecting the data of both customers and employees.

N2K’s Network Monitoring and Scanning Tools course takes a comprehensive approach to teaching with a combination of theory-based and hands-on instruction on how to monitor and secure enterprise networks. Learners will become familiar with several commonly used network monitoring, security, and scanning tools, and how to effectively use and maintain them. 

This is an on-demand course with 10 hours of guided instruction and demonstrations presented in an easy-to-digest format from instructors with years of teaching and technical experience. Private live online sessions are available for enterprise teams.

Network Tools Covered

The network monitoring and scanning tools covered in this course were selected with intention. Core tools featured are Wireshark, Nmap, Zenmap, Masscan, Nessus, BurpSuite, and Ping. These are freely available tools that are widely used across several organizations and were voted the most popular for their specialty area.

Prerequisites

It is recommended to have some basic knowledge of IT or computer networking, or possess the CompTIA IT Fundamentals (ITF+) certification, but neither are formally required.

What to Pursue Next

Following the completion of the Network Monitoring and Scanning course, the ideal next steps would be to pursue training for the following:

Who should take this course?

  • Practitioners positioning themselves into Network Engineer roles to have a handle on common tools and the inner workings of those tools.
  • New Service Desk Analyst, Technical Support Specialist, Desktop Support Administrator, or System Support Specialist who needs to how a network runs, how to know what’s on it, and potential vulnerabilities.

Benefits of Training

Organizations participating in this offering will experience the following major benefits:

  • Theoretical plus hands-on, real-world training in a digestible format.
  • Cheat Sheet and Summary Notes for added support.
  • Engaging and knowledgeable instructors with years of teaching and technical experience.

Want to learn how N2K can set up your team for success?

Course Outline

As a true foundational curriculum, the Network Monitoring & Scanning Tools course has two core units that establish foundational network security concepts, plus exploration and demonstration of commonly used network security tools.

  • Do you know what’s on your network right now? This unit will help you understand ICMP, traceroute, and how to use certain tools to monitor, and secure, your network. Tools covered include:

    • Ping
    • Zenmap
    • Nmap
    • Wireshark
  • Dive deeper into scanning tools that help secure the network. Learners will understand how servers and websites work, how to implement and interpret vulnerability scans, and how to scan large networks. Also learn what is a virtual machine, its purpose, and its usage. Tools covered include:

    • Burp Suite
    • Nessus
    • Masscan
    • Hypervisors and Virtual Machines
This course includes:
  • Optional – Live Online Sessions
  • 10 hours of on-demand videos, including lectures and demos
  • Hands-on practice labs
  • Tools Cheat Sheet & Summary Notes
  • 10-Question Diagnostic Exam 
  • 10-Question Final Exam
  • Two Knowledge Check Quizzes
  • Personal Performance Tracker

Why N2K?

When it comes to training, we know that you and your organization have several options to choose from. This is what separates N2K from the pack.

Data-Driven

Measure improvements with robust performance analytics

Relevant

Build the right knowledge and skills specific to roles

Efficient

Foster long-term retention without wasting time on cramming

Cost-Effective

Total costs average 50% less per person compared to the leading bootcamp

Request Pricing

Why N2K?

When it comes to certification training, we know that you and your organization have several options to choose from. This is what separates N2K from the pack.

DATA-DRIVEN

Measure improvements with robust performance analytics

EFFICIENT

Foster long-term retention without wasting time on cramming

RELEVANT

Build the right knowledge and skills specific to roles

COST-EFFECTIVE

Total costs average at least 50% less per person compared to the leading bootcamp

Request Pricing

Request more information on training options for your cybersecurity teams. Private classes are available.


“We had excellent help from the account management to the instructors — a great experience all around. Really great business and people.”

Director of SOC, Fortune 50 Retail Company

GartnerPeerInsights_N2K

Network Monitoring & Scanning Tools Course FAQs

  • The network monitoring and scanning tools covered in this course were selected with intention. Core tools featured are Wireshark, Nmap, Zenmap, Masscan, Nessus, BurpSuite, and Ping. These are freely available tools that are widely used across several organizations and were voted the most popular for their specialty area.

  • The standard training modality of the course is video-on-demand. Participants have access to all training tools including video lessons, guided labs, knowledge checks, and more within our proprietary LMS for 180-days. Live online instruction is available upon request for enterprise teams.

  • No. While certain units and topics may reflect select certifications, the intended purpose of the Network Monitoring & Scanning Tools course is not to prepare for an exam but to cover the foundational concepts and processes of common networking tools.

  • There are several options for participants to take after completing the Cloud Security Essentials course. The CompTIA A+ (Core Exam 1 and Core Exam 2) certifications are ideal for entry-level practitioners seeking their first credential. Alternatively, for more technical training, the ideal next steps would be for Wireshark or Security Operations.

    • Troy McMillan, Content Manager for VMWare, Cisco, JUNOS
      • CISSP, CEH, CCNP, CySA+, CWNE, VCP
    • Tim Stover, Lead Content Developer with Hands-On Training
      • CEH, PenTest+, Sec+
  • Yes! Participants receive a digital badge once they have successfully completed the course. This badge can be displayed on social profiles or email signatures. Click here to learn more about N2K’s digital badging.