Gain hands-on experience with essential network security tools. Learn how to analyze network traffic, scan for vulnerabilities, configure firewalls, and detect intrusions with this interactive toolkit.
Wireshark is a network protocol analyzer that lets you capture and interactively browse the traffic running on a computer network. Learn how to use it to inspect packets, diagnose issues, and detect security threats.
Nmap (Network Mapper) is a powerful security scanner used to discover hosts and services on a computer network. Learn how to detect open ports, identify running services, and discover potential vulnerabilities.
Configure and manage firewall rules to control network traffic. Learn how to set up policies that allow or block specific types of connections based on source, destination, protocol, and other criteria.
Priority | Action | Protocol | Source | Destination | Port | Description | Actions |
---|---|---|---|---|---|---|---|
1 | ALLOW | TCP | ANY | 192.168.1.15 | 80, 443 | Allow web traffic to web server |
|
2 | ALLOW | TCP | 192.168.1.0/24 | 192.168.1.10 | 22, 445 | Allow internal SSH and SMB |
|
3 | DENY | TCP | ANY | 192.168.1.24 | 445 | Block external SMB access |
|
4 | LOG | TCP | ANY | 192.168.1.0/24 | 3389 | Log RDP connection attempts |
|
5 | DENY | ALL | ANY | ANY | ANY | Default deny rule |
|
Monitor network traffic for suspicious activity and security policy violations with an Intrusion Detection System (IDS). Learn how to identify and respond to potential security
Monitor network traffic for suspicious activity and security policy violations with an Intrusion Detection System (IDS). Learn how to identify and respond to potential security threats in real-time.