Network Protocols for Security: DNS course. In this course, you will learn how to generate network traffic to analyze the performance of DNS queries and responses. After completing the course, you will have a basic understanding of how to find anomalies in DNS. The ability to understand network protocols is an essential implicit skill for success in cybersecurity. In this course, “Network Protocols for Security: DNS,” you will learn to analyze DNS network traffic.
First, you’ll examine a typical DNS request to understand how queries and responses work. Next, you’ll modify the local hosts file to see one way DNS can be abused. Finally, you will analyze a command and control conversation to gain further insight into malicious DNS conversations. When you complete this course, you will have the skills and knowledge of DNS needed to find anomalies and malicious activity in network traffic.
What you will learn:
- How DNS queries and responses work
- How to abuse DNS by changing the hosts file
- How to analyze DNS command and control conversations
- How to find anomalies and malicious activity in DNS traffic
This course is suitable for people who:
- Interested in learning about cyber security
- They have basic knowledge of networks
- Want to have a deeper understanding of DNS
- They want to learn how to find anomalies and malicious activities in network traffic
Be the first to comment