Time: 9.00am – 5.00pm
Duration: 9 Days
A cyber analyst who does not possess a deep understanding of computer networks (such as protocols, services and tools) will be unable to fully comprehend threats and incidents. Theoretical knowledge alone is insufficient as deep understanding can only be acquired with practical experience, especially in areas such as sniffing, analyzing, configuring services and programming.
In this module, participants will deep dive into the five-layered TCP/IP model and common protocols, learn how to capture and analyze network traffic, use Python to implement theory concepts, as well as be introduced to tools and major network services.
Computer networks are the bread and butter of cybersecurity, and analysts will need to have a profound understanding to be able to effectively secure it.
This module is part of Higher Certificate of Cyber Security (Foundation).
This course will equip learners with skills to analyse suspicious network traffic, investigate and troubleshoot network issues, write tools which will assist him/her in collecting data and monitoring the network.
At the end of the course, learners will be able to:
- Acquire deep understanding of the 5 Layers Model
- Analyse captured traffic (pcaps)
- Obtain theoretical understanding of major protocols – HTTP, DNS, TCP/IP, UDP, ARP
- Gain practical experience in network tools
- Write network apps using Python/Scapy
- Develop the ability to self-learn new protocols
- Grasp network architecture and network services
- OSI and 5 Layers Model
- Data link layer and Ethernet
- Capturing and analysing network traffic using Scapy
- Network layer and IP
- Transportation layer – TCP and UDP
- Application layer – HTTP, DNS, Emails and other protocols
- Network architecture
- Windows networking and Active Directory
Who Should Attend
- Cyber Security Analyst
- IT Manager
Python programme experience
(Click their photos to view their short biographies)
Mr Dvir Chikvashvili
Mr Dvir Chikvashvili
Mr Dvir Chikvashvili is a cyber security professional specializing in cloud security and currently is the Program Manager at DART.
He started programing at 13 and attained the CCNA certification at 14. He also wrote his first malware at the age of 15.
He has varied experiences both from the IDF and Israel’s wider tech industry.
During his career, he has consistently found a way to integrate his tech skills with his passion for teaching. He has lectured and trained other cyber security professionals in the IDF, Israeli colleges and more recently in Singapore.
He is interested in artificial intelligence, philosophy, woodworking, and biking.
Mr Gur Sharon
Mr Gur Sharon
Mr Gur Sharon is a cyber defense expert with practical experience in SOC, IR, forensics, threat assessment and is a Senior Trainer at DART.
He has a deep passion for network security, with extensive knowledge in network protocols, network security products and network traffic analysis.
After several years in the IDF’s cyber units leading Incident Response and Threat Hunting operations, Gur retired and dedicated himself to cyber security training, coaching hundreds of cyber experts all over the world.
In his free time, Gur solves puzzles, plays different instruments and enjoys exploring Singapore on his bicycle.
Mr Rony Munitz
Mr Rony Munitz
After a decade of different operational roles in red teams, incident response, and threat hunting operations, both as an expert and a team leader, Rony dedicated his time training the next generation of cyber experts. He is currently a Program Manager at DART.
As a researcher, he found several vulnerabilities and developed attack techniques on Windows, Mac and IoT devices. During his career he was a researcher and team leader in IDF Intelligence Corps top cybersecurity unit, Accenture, Novartis and XM Cyber.
Rony is a Japanese food enthusiast and a K-drama fan.
Mr Ron Suhodrev
Mr Ron Suhodrev
Mr Ron Suhodrev is a cybersecurity professional with over 10 years of experience. His first exposure to programming was at 12 years old at Ben Gurion University. At 16, Ron started working as a freelance developer and at 18 joined a prestigious cybersecurity unit in the Intelligence Crops in the IDF.
After his time in the unit, Ron worked as a researcher in leading cybersecurity companies as Trusteer (IBM) and Perception Point while on his spare time tutored computer science university students.
Before moving to Singapore, Ron was the founder of two different startups – one in medical education and another in cybersecurity training and recruitment.
In Singapore, Ron successfully led a two-year-long cybersecurity program and is now acting as Chief Scientist in DART.
Ron’s interests include cutting-edge technology, education, longevity research, philosophy, and diving.
Mr Zhuang Weiliang
Mr Zhuang Weiliang
Mr Zhuang Weiliang has more than 10 years of experience in Intelligence, Weiliang started out in Singapore Armed Forces (SAF) as an Intelligence Officer specializing in analyzing information and production of Intelligence products related to the region.
He transited to the Defence Cyber Organisation (DCO) in MINDEF later in his career, dealing with intelligence collection and analysis of cyber threats pertaining to Singapore. He has also set up the collection and analysis systems while he was there.
He later joined Ensign as a Lead Consultant where he started the Cyber Threat Intelligence (CTI) team providing intelligence products to clients and kept abreast of potential cyber threats. He was also involved in Incident Response and Malware Analysis during his time in Ensign.
As a Lead Trainer at DART, Weiliang’s focus is to train new cyber experts and researchers.
Outside of work Weiliang spends most of his time in Crossfit, Ultimate Frisbee, and keeping up to date with the latest technologies.
Insight from Instructor
“To understand how a cyber-attack happened in the network, one must have a solid understanding of computer networks – protocols, services, architecture, and tools.
Computer Networks are actually the bread and butter of cyber security and is essential for anyone looking to dive into the world of cyber security. This course will equip you with a comprehensive understanding of the 5 layers Model, common protocols and analyzing network traffic.
In this module, the participants will gain a deep understanding of data communication principals, the OSI and TCP/IP layers models including each one of the layers, routing, how signals are used to transfer data between nodes, internet communication, packets’ structure routing, and chosen network protocols. They will practice how to capture, filter and analyze traffic using Wireshark (including inferring a network layout based on captures), gain practical experience with network useful tools and learn about different network services and how to plan, read and establish network diagrams and architecture, implement Firewalls. In addition, they will learn how to develop their own tools to generate traffic and collect data by using Python and Scapy. Once completion of this course, they will have practical experience in designing a network, installing and configuring network services and the ability to set all together to setup their own internal network based on VMs.”
Total Nett Programme Fee Payable, Including GST, after additional funding from the various funding schemes
Participants must fulfill at least 75% attendance and pass all assessment components to be eligible for SSG funding.
To enquire, email firstname.lastname@example.org
To register, click Register
For members of public and NUS Alumnus (without R&G Voucher), please follow the steps below:
Select Short Course / Modular Course -> Apply for Myself -> Browse Academic Modules / Short Courses-> Module/Course Category -> Short Courses -> Browse Courses-> Advanced Computing for Exe (Faculty/Department / Unit)
Please download the user guide for NUS Online Application Portal after you click ‘Apply for Myself’ if you need assistance.
Course Fee Breakdown
Singapore Citizens39 years old or younger
Singapore Citizen40 years old or older