FC-04

Network protocols, attacks and Active Directory. TCP/IP deep dive, Nmap NSE, MITM, Kerberoasting, BloodHound and Pivoting via Chisel and Ligolo-ng. Requires FC-02.

50 lessons10 modulesIntermediate4 themes

Why network security is a must-have

Numbers that explain everything

82%of cyberattacks exploit network-level vulnerabilities
$9.44Maverage cost of a data breach in the US in 2023
1,500+new network vulnerabilities published every year
4 minto perform ARP spoofing and intercept network traffic

After the course you will be able to

Not theory — concrete techniques and tools you can demonstrate in an interview

🌐Deep dive into the TCP/IP stack: Ethernet, ARP, IP routing, TCP sessions
🔍Scan networks with Nmap Advanced: NSE scripts, OS detection, stealth techniques and Masscan
🕵️Gather OSINT on targets via Shodan, Censys, Maltego and Google Dorking
🎭Perform MITM attacks: ARP spoofing, HTTPS interception, DNS spoofing with Ettercap and Bettercap
📡Crack Wi-Fi WPA2 via handshake capture and PMKID attack with Aircrack-ng
🏢Enumerate Active Directory: SMB, LDAP, SNMP, enum4linux — attack map with BloodHound
🎫Execute AD attacks: Kerberoasting, AS-REP Roasting, Pass-the-Hash, DCSync
🔀Set up Pivoting via Chisel and Ligolo-ng: access isolated network segments

Real attacks in the course

Every tool in the course is analyzed through real attacks and incidents

Real case2010

Stuxnet — attack on Iranian centrifuges

The first cyberweapon in history spread through networks and USB. It destroyed 20% of Iran's nuclear centrifuges. It used four zero-day vulnerabilities simultaneously — unprecedented.

Lesson 12 · Lateral movement in networks
Real case2013

Target — 40M cards via HVAC contractor

Hackers infiltrated Target's network through HVAC contractor credentials. Network segmentation was absent — they reached POS terminals and stole 40 million cards.

Lesson 29 · Network segmentation and VLANs
Success story2008

Dan Kaminsky — saved the internet from DNS catastrophe

A researcher discovered a critical DNS protocol vulnerability that could redirect all internet traffic. He secretly coordinated an emergency patch for all vendors in 30 days.

Lesson 38 · DNS attacks and defense

Course Program

10 modules · 50 lessons · 4 themes: Networks Inside Out, Network Attacks, Active Directory & Infrastructure, Advanced Techniques

Where this course leads

FC-04 — the foundation for careers in network security and incident monitoring

$3,500 — $8,000/mo

Network Pentester

Conduct penetration tests on network infrastructure — from perimeter to internal network.

NmapWiresharkMetasploitScapy
Track:FC-02 → FC-04 → MC-03
$3,000 — $7,000/mo

Network Security Engineer

Design and protect company network infrastructure. Firewalls, IDS/IPS, segmentation.

FirewallIDS/IPSVPNVLAN
Track:FC-04 → FC-06 → FC-08
$2,000 — $5,000/mo

SOC Analyst (L2/L3)

Monitor and investigate incidents in corporate networks. Knowledge of network attacks is the foundation.

SIEMWiresharkIDS/IPSThreat Hunting
Track:FC-04 → FC-07 → FC-09

Who this course is for

🔗

After FC-02

Completed Linux fundamentals and basic tools, ready to dive into network security — from traffic analysis to Wi-Fi attacks

🖥️

Network administrators

Want to understand how attackers target your infrastructure and learn to independently test corporate network security

🛡️

Future SOC Analysts

Want to work in Blue Team, investigate incidents and understand network attacks at the packet level

Master network security
from traffic interception to
network auditing

50 lessons with Wireshark, Nmap, Ettercap and Aircrack-ng. Practice on real vulnerable networks in a lab environment.

FC-04● Available

Network Security and Attacks

Level: intermediate

50 lessons
video + practice
50 hours
of content
10 modules
by topic
3 themes
Protocols → Attacks → Audit
MITM and ARP spoofing in practice
Wi-Fi cracking with Aircrack-ng
IDS/IPS and Firewall configuration
Final project: corporate network audit