This series will cover the eight curriculum modules developed through a partnership with ADE, UCA, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.

Module 2

Knowing Normal: Recognizing Traffic Patterns

Knowing what normal looks like in a network is key in understanding it but is also important in troubleshooting problems that might arise in that network. Learning the steps to find, track, and interpret network data are crucial skills to learn in a world where so much of what we do depends on those systems functioning efficiently. In this module, we take the first steps through exploration using tools within the Cyber Range that gather data from a network. We also begin the practice of properly recording network data.

Lesson One

Know Normal

Segment 1 of 10

Baselining

Segment 2 of 10

ARP Table Activity

Segment 3 of 10

Ping Sweep

Segment 4 of 10

Ping Sweep Command

Segment 5 of 10

Lesson Two

Nmap and Zenmap

Segment 6 of 10

Asset Management

Segment 7 of 10

Monitoring Network Traffic

Segment 8 of 10

Network Mapping and Packet Analysis

Segment 9 of 10

Summing Up

Segment 10 of 10