Learning Path (Beginner + Intermediate)

Network Security

Strengthen detection, hardening, and network response.

Save 79 EUR

Lab tools you will use

WiresharkNmapSuricataZeektcpdumpSnortOpenVASMetasploitBurp SuiteNessusSecurity OnionWazuhntopngNetworkMinerOSSECArgusWiresharkNmapSuricataZeektcpdumpSnortOpenVASMetasploitBurp SuiteNessusSecurity OnionWazuhntopngNetworkMinerOSSECArgusWiresharkNmapSuricataZeektcpdumpSnortOpenVASMetasploitBurp SuiteNessusSecurity OnionWazuhntopngNetworkMinerOSSECArgusWiresharkNmapSuricataZeektcpdumpSnortOpenVASMetasploitBurp SuiteNessusSecurity OnionWazuhntopngNetworkMinerOSSECArgus

Included Courses

BEGINNER

Network Security Beginner

Practical network security foundations with guided hands-on labs.

1 guided lab10h
INTERMEDIATE

Network Security Intermediate

Intermediate network security with complex real-world scenarios and professional workflow.

2 guided labs12h

Why Choose the Full Pack?

Get the Beginner + Intermediate courses bundled together and unlock exclusive extras.

Save 79 EUR
Beginner + Intermediate courses (22h)
All 4 guided labs with isolated VMs
All per-module + certification exams
2 HTK certificates (Beginner + Intermediate)
Extra consolidation lab
Lifetime access + priority support
Access to the HTK community
Join Waitlist →
199 EUR278 EUR

Roadmap

Each phase maps to a course module; scroll to reveal your full progression from beginner fundamentals to intermediate mastery.

1

Phase 1

Beginner

Network Fundamentals & Network Threats

Start your network security journey with Network Security Beginner.

  • OSI/TCP-IP model: security-relevant protocols (TCP, UDP, DNS, HTTP, TLS)
  • Network threat landscape: reconnaissance, lateral movement, C2, exfiltration
  • Essential tools: Wireshark, tcpdump, Nmap
2

Phase 2

Beginner

Network Capture Analysis with Wireshark

  • Display and capture filters: BPF syntax and Wireshark filters
  • TCP/UDP stream following: conversation reconstruction
  • Identifying scans, fuzzing, and exploitation patterns in pcap
3

Phase 3

Beginner

Intrusion Detection with Suricata & Zeek

  • NIDS architecture: rules, alerts, logs
  • Writing basic Suricata rules to detect known IOCs
  • Analyzing Zeek logs: conn.log, dns.log, http.log, ssl.log
4

Phase 4

Beginner

Hardening & Response + Certification Exam

  • Basic network hardening: segmentation, ACLs, least privilege
  • Building a network incident report: timeline, IOCs, recommendations
5

Phase 5

Intermediate

Advanced Network Analysis & Threat Hunting

Advance into complex scenarios with Network Security Intermediate.

  • Encrypted traffic analysis: JA3/JA3S fingerprinting and TLS metadata
  • DNS tunneling and covert channel detection techniques
  • Network-based threat hunting: hypothesis-driven and indicator-based
6

Phase 6

Intermediate

Advanced IDS Engineering with Suricata

  • Complex Suricata rule writing: flowbits, thresholds, and lua scripting
  • Performance tuning: rule optimization and suppression strategies
  • Integration with SIEM: alert enrichment and correlation
7

Phase 7

Intermediate

Zeek Scripting & Network Forensics

  • Zeek scripting language: custom analyzers and detection scripts
  • File extraction and protocol analysis from network captures
  • Lateral movement detection: SMB, RDP, and WMI traffic patterns
8

Phase 8

Intermediate

Incident Report + Intermediate Certification

  • Comprehensive network incident report: timeline, kill chain mapping
  • Detection engineering recommendations and network hardening plan
Network Security Learning Path: Beginner to Intermediate Cybersecurity Course | HackTheKnowledge | HackTheKnowledge