This training aims to review various attacks targeting network protocols and equipment. Demonstrations and practical exercises of attacks will be conducted, along with explanations of the countermeasures to be implemented. We will first study attacks targeting or exploiting Layer 2 protocols that take advantage of misconfigured switches. This will be followed by attacks targeting routers and VPN systems. Finally, we will focus on equipment that can enhance network security (firewalls, IDS/IPS, proxies, etc.).
Specific Objectives:
- To fully understand vulnerabilities
- To deploy robust configurations and apply best practices
- To effectively protect users