Network protocols, attacks and Active Directory. TCP/IP deep dive, Nmap NSE, MITM, Kerberoasting, BloodHound and Pivoting via Chisel and Ligolo-ng. Requires FC-02.
Why network security is a must-have
Numbers that explain everything
After the course you will be able to
Not theory — concrete techniques and tools you can demonstrate in an interview
Real attacks in the course
Every tool in the course is analyzed through real attacks and incidents
Stuxnet — attack on Iranian centrifuges
The first cyberweapon in history spread through networks and USB. It destroyed 20% of Iran's nuclear centrifuges. It used four zero-day vulnerabilities simultaneously — unprecedented.
Target — 40M cards via HVAC contractor
Hackers infiltrated Target's network through HVAC contractor credentials. Network segmentation was absent — they reached POS terminals and stole 40 million cards.
Dan Kaminsky — saved the internet from DNS catastrophe
A researcher discovered a critical DNS protocol vulnerability that could redirect all internet traffic. He secretly coordinated an emergency patch for all vendors in 30 days.
Course Program
10 modules · 50 lessons · 4 themes: Networks Inside Out, Network Attacks, Active Directory & Infrastructure, Advanced Techniques
Where this course leads
FC-04 — the foundation for careers in network security and incident monitoring
Network Pentester
Conduct penetration tests on network infrastructure — from perimeter to internal network.
Network Security Engineer
Design and protect company network infrastructure. Firewalls, IDS/IPS, segmentation.
SOC Analyst (L2/L3)
Monitor and investigate incidents in corporate networks. Knowledge of network attacks is the foundation.
Who this course is for
After FC-02
Completed Linux fundamentals and basic tools, ready to dive into network security — from traffic analysis to Wi-Fi attacks
Network administrators
Want to understand how attackers target your infrastructure and learn to independently test corporate network security
Future SOC Analysts
Want to work in Blue Team, investigate incidents and understand network attacks at the packet level
Master network security
from traffic interception to
network auditing
50 lessons with Wireshark, Nmap, Ettercap and Aircrack-ng. Practice on real vulnerable networks in a lab environment.
Network Security and Attacks
Level: intermediate

