Online Training Course
Network Monitoring & Scanning Tools
Understand Internet operations, virtual machines, network scanning, and vulnerability assessment with hands-on training using top network security tools.
Course Overview
As your organization expands with new, interconnected technologies and a growing decentralized workforce, maintaining network security is critical to effectively delivering services and protecting the data of both customers and employees.
N2K’s Network Monitoring and Scanning Tools course takes a comprehensive approach to teaching with a combination of theory-based and hands-on instruction on how to monitor and secure enterprise networks. Learners will become familiar with several commonly used network monitoring, security, and scanning tools, and how to effectively use and maintain them.
This is an on-demand course with 10 hours of guided instruction and demonstrations presented in an easy-to-digest format from instructors with years of teaching and technical experience. Private live online sessions are available for enterprise teams.
Network Tools Covered
The network monitoring and scanning tools covered in this course were selected with intention. Core tools featured are Wireshark, Nmap, Zenmap, Masscan, Nessus, BurpSuite, and Ping. These are freely available tools that are widely used across several organizations and were voted the most popular for their specialty area.
Prerequisites
It is recommended to have some basic knowledge of IT or computer networking, or possess the CompTIA IT Fundamentals (ITF+) certification, but neither are formally required.
What to Pursue Next
Following the completion of the Network Monitoring and Scanning course, the ideal next steps would be to pursue training for the following:
- CompTIA A+ (Core Exam 1 and Core Exam 2)
- Wireshark
- SOC Analyst
Who should take this course?
- Practitioners positioning themselves into Network Engineer roles to have a handle on common tools and the inner workings of those tools.
- New Service Desk Analyst, Technical Support Specialist, Desktop Support Administrator, or System Support Specialist who needs to how a network runs, how to know what’s on it, and potential vulnerabilities.
Benefits of Training
Organizations participating in this offering will experience the following major benefits:
- Theoretical plus hands-on, real-world training in a digestible format.
- Cheat Sheet and Summary Notes for added support.
- Engaging and knowledgeable instructors with years of teaching and technical experience.
Want to learn how N2K can set up your team for success?
Course Outline
As a true foundational curriculum, the Network Monitoring & Scanning Tools course has two core units that establish foundational network security concepts, plus exploration and demonstration of commonly used network security tools.
Unit 1: Network Monitoring & Security Tools
Do you know what’s on your network right now? This unit will help you understand ICMP, traceroute, and how to use certain tools to monitor, and secure, your network. Tools covered include:
- Ping
- Zenmap
- Nmap
- Wireshark
Unit 2: Network Scanning Tools
Dive deeper into scanning tools that help secure the network. Learners will understand how servers and websites work, how to implement and interpret vulnerability scans, and how to scan large networks. Also learn what is a virtual machine, its purpose, and its usage. Tools covered include:
- Burp Suite
- Nessus
- Masscan
- Hypervisors and Virtual Machines
This course includes:
- Optional – Live Online Sessions
- 10 hours of on-demand videos, including lectures and demos
- Hands-on practice labs
- Tools Cheat Sheet & Summary Notes
- 10-Question Diagnostic Exam
- 10-Question Final Exam
- Two Knowledge Check Quizzes
- Personal Performance Tracker
Why N2K?
Data-Driven
Relevant
Efficient
Cost-Effective
Request Pricing
Why N2K?
DATA-DRIVEN
EFFICIENT
RELEVANT
COST-EFFECTIVE
Request Pricing
Request more information on training options for your cybersecurity teams. Private classes are available.
Network Monitoring & Scanning Tools Course FAQs
What tools are covered in this course?
The network monitoring and scanning tools covered in this course were selected with intention. Core tools featured are Wireshark, Nmap, Zenmap, Masscan, Nessus, BurpSuite, and Ping. These are freely available tools that are widely used across several organizations and were voted the most popular for their specialty area.
How is training delivered?
The standard training modality of the course is video-on-demand. Participants have access to all training tools including video lessons, guided labs, knowledge checks, and more within our proprietary LMS for 180-days. Live online instruction is available upon request for enterprise teams.
Does this course train towards a certification?
No. While certain units and topics may reflect select certifications, the intended purpose of the Network Monitoring & Scanning Tools course is not to prepare for an exam but to cover the foundational concepts and processes of common networking tools.
What are recommended subsequent courses?
There are several options for participants to take after completing the Cloud Security Essentials course. The CompTIA A+ (Core Exam 1 and Core Exam 2) certifications are ideal for entry-level practitioners seeking their first credential. Alternatively, for more technical training, the ideal next steps would be for Wireshark or Security Operations.
Who are the instructors of the course?
- Troy McMillan, Content Manager for VMWare, Cisco, JUNOS
- CISSP, CEH, CCNP, CySA+, CWNE, VCP
- Tim Stover, Lead Content Developer with Hands-On Training
- CEH, PenTest+, Sec+
- Troy McMillan, Content Manager for VMWare, Cisco, JUNOS
Is a certificate of completion available?
Yes! Participants receive a digital badge once they have successfully completed the course. This badge can be displayed on social profiles or email signatures. Click here to learn more about N2K’s digital badging.