Network Attacks exploit weaknesses in network security as an attack vector. This skill path is designed to provide you with a general understanding of Network Attacks in the context of a Penetration Tester work role. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.
Learners at 96% of Fortune 1000 companies trust Cybrary
Network Attacks exploit weaknesses in network security as an attack vector. This skill path is designed to provide you with a general understanding of Network Attacks in the context of a Penetration Tester work role.
In this skill path, you will learn the basics of Network Attacks for Penetration Testers, the Metasploit Framework, Network Sniffing, and Tunneling and Pivoting.
Completing this skill path and the associated Assessment will prepare you for pursuing a career as a Penetration Tester. Upon completing this skill path, you are encouraged to enroll in the complete Penetration Tester career path.
The Incident Response Skill Path is expected to release in Q2 of 2025. Sign up now to explore our other Incident Response courses and content.
Start Learning for FreeLearn core concepts and get hands-on with key skills.
In this course, you will learn the basics of network-based attacks. You will learn about active and passive network attacks, as well as network devices, services, and protocols, and the common attack types and techniques directed at them.
In this hands-on lab, you will learn the basics of network sniffing, including passive and active sniffing techniques. You will practice using Wireshark to sniff network traffic, and retrieve and apply actionable information from a target network.
In this hands-on lab, you will learn the basics of Metasploit, a popular penetration testing tool. You will practice using some core features of Metasploit to identify and exploit vulnerabilities on a live server.
In this hands-on lab, you will learn about tunneling and pivoting as tactics for traversing target networks. You will practice tunneling and pivoting using Metasploit and SSH Dynamic Port Forwarding.
Exercise your problem-solving and creative thinking skills with security-centric puzzles
In this hands-on challenge, you will practice network sniffing. You will interpret and manipulate a packet capture to gain access to other hosts on a target network.
In this hands-on challenge, you will practice identifying and exploiting vulnerabilities on a target host, then using tunneling and pivoting to broker access to internal services
Assess your knowledge and skills to identify areas for improvement and measure your growth
In this course, you will learn the basics of network-based attacks. You will learn about active and passive network attacks, as well as network devices, services, and protocols, and the common attack types and techniques directed at them.
Cybrary’s expert-led cybersecurity courses help your team remediate skill gaps and get up-to-date on certifications. Utilize Cybrary to stay ahead of emerging threats and provide team members with clarity on how to learn, grow, and advance their careers within your organization.
Put your skills to the test in virtual labs, challenges, and simulated environments.
Track your skills development from lesson to lesson using the Cybrary Skills Tracker.
Connect with peers and mentors through our supportive community of cybersecurity professionals.