We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Network Protocols for Security

SMB

Brandon DeVault

In this course, you’ll practice creating network traffic and inspecting the behavior of the SMB protocol. When you’re finished, you’ll have a fundamental understanding on how to find anomalies within SMB.

Read more

In this course, you’ll practice creating network traffic and inspecting the behavior of the SMB protocol. When you’re finished, you’ll have a fundamental understanding on how to find anomalies within SMB.

Understanding how network protocols operate is an implied skill required to be successful in cyber security. In this course, Network Protocols for Security: SMB, you’ll learn to analyze SMB network traffic. First, you’ll explore how to create sample SMB traffic by using the file share feature in Windows. Next, you’ll discover how to analyze SMB commands at a packet level. When you’re finished with this course, you’ll have the skills and knowledge of SMB needed to find anomalies and malicious activity amongst network traffic.

Enroll now

What's inside

Syllabus

Course Overview
Generating SMB Traffic
Analyzing SMB Commands

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Connects back to Windows systems for many students
Examines SMB, which is useful in cyber security and network protocols
Develops fundamental understanding of SMB
Taught by Brandon DeVault, who runs the popular blog Security Boulevard
Students will be expected to create sample SMB traffic
Students will analyze SMB commands at a packet level

Save this course

Save Network Protocols for Security: SMB to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Network Protocols for Security: SMB. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Network Protocols for Security: SMB will develop knowledge and skills that may be useful to these careers:
Cybersecurity Engineer
A Cybersecurity Engineer designs, deploys, and maintains an organization's cybersecurity infrastructure, including network security protocols, firewalls, and intrusion detection systems. This course, Network Protocols for Security: SMB, helps build a foundation for understanding network security protocols, which is essential for a Cybersecurity Engineer.
Network Security Engineer
A Network Security Engineer designs, deploys, and maintains an organization's network security infrastructure, including network security protocols, firewalls, and intrusion detection systems. This course, Network Protocols for Security: SMB, helps build a foundation for understanding network security protocols, which is essential for a Network Security Engineer.
Cybersecurity Analyst
A Cybersecurity Analyst plans, develops, and implements an organization's cybersecurity program, including the development and implementation of network security protocols. This course, Network Protocols for Security: SMB, can help a Cybersecurity Analyst understand and implement network security protocols.
Cloud Security Architect
A Cloud Security Architect designs and implements an organization's cloud security architecture, including network security protocols. This course, Network Protocols for Security: SMB, can help a Cloud Security Architect understand and implement network security protocols in a cloud environment.
Information Security Analyst
An Information Security Analyst plans, develops, and implements an organization's information security program, including the development and implementation of network security protocols. This course, Network Protocols for Security: SMB, can help an Information Security Analyst understand and implement network security protocols.
Network Security Consultant
A Network Security Consultant advises organizations on network security matters, including the development and implementation of network security protocols. This course, Network Protocols for Security: SMB, can help a Network Security Consultant understand and implement network security protocols.
Security Architect
A Security Architect designs and implements an organization's security architecture, including network security protocols, firewalls, and intrusion detection systems. This course, Network Protocols for Security: SMB, can help a Security Architect understand and implement network security protocols.
Chief Information Security Officer
A Chief Information Security Officer plans, develops, and implements an organization's information security program, including the development and implementation of network security protocols. This course, Network Protocols for Security: SMB, can help a Chief Information Security Officer understand and implement network security protocols.
Data Security Analyst
A Data Security Analyst plans, develops, and implements an organization's data security program, including the development and implementation of network security protocols. This course, Network Protocols for Security: SMB, can help a Data Security Analyst understand and implement network security protocols.
Information Technology Director
An Information Technology Director plans, designs, and implements an organization's IT strategy, including the deployment of computer systems, networks, and other technologies. This course, Network Protocols for Security: SMB, may be useful to an Information Technology Director because it helps build a foundation for understanding network security protocols.
Incident Responder
An Incident Responder responds to and investigates security incidents, including network security breaches. This course, Network Protocols for Security: SMB, can help an Incident Responder understand network security protocols and how they can be exploited.
IT Manager
An IT Manager plans, develops, and manages an organization's IT infrastructure, including network security protocols. This course, Network Protocols for Security: SMB, can help an IT Manager understand and implement network security protocols.
Threat Intelligence Analyst
A Threat Intelligence Analyst gathers and analyzes information about threats to an organization's computer networks, including network security protocols. This course, Network Protocols for Security: SMB, can help a Threat Intelligence Analyst understand network security protocols and how they can be exploited.
Network Administrator
A Network Administrator manages and maintains an organization's computer networks, including the installation and maintenance of hardware and software, the monitoring of network performance, and the troubleshooting of network problems. This course, Network Protocols for Security: SMB, may be useful to a Network Administrator because it helps build a foundation for understanding and troubleshooting network protocols.
Network Security Analyst
A Network Security Analyst plans, designs, deploys, and maintains a company's computer network infrastructure, enforcing security protocols, monitoring networks for intrusions, enforcing security policies, and providing technical guidance on network security matters. This course, Network Protocols for Security: SMB, may be useful to a Network Security Analyst because it helps build a foundation for monitoring and analyzing network traffic.

Reading list

We've selected 18 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Network Protocols for Security: SMB.
Offers a comprehensive treatment of security engineering principles and best practices, covering topics such as threat modeling, risk assessment, and secure software development.
Provides a comprehensive overview of network security assessment methodologies and techniques, covering topics such as reconnaissance, scanning, exploitation, and reporting.
Provides a deep dive into the design and implementation of cryptographic algorithms and protocols, covering topics such as symmetric and asymmetric encryption, hashing, and digital signatures.
Provides a step-by-step guide to malware analysis, covering topics such as reverse engineering, dynamic analysis, and threat intelligence.
Classic reference on the TCP/IP protocol suite. It provides a detailed description of the protocols, including their implementation and operation. It is an essential resource for anyone who wants to understand how the Internet works.
Provides practical guidance on using OpenSSL to implement secure network protocols and applications, covering topics such as TLS/SSL, VPNs, and digital certificates.
Provides a comprehensive overview of computer security concepts and techniques, covering topics such as cryptography, network security, and access control.
Provides a comprehensive overview of network security, including the threats, vulnerabilities, and countermeasures. It valuable resource for anyone interested in learning about network security.
Provides a theoretical foundation for security analysis, covering topics such as access control, information flow, and system security.
Provides insights into the psychology of deception and social engineering attacks, covering topics such as pretexting, phishing, and identity theft.
Provides a comprehensive overview of firewalls and intrusion detection systems. It covers the principles and practices used to protect networks from unauthorized access and attacks.
Provides a foundational understanding of computer networking concepts, protocols, and technologies, including network security principles.
Provides a comprehensive overview of computer security. It covers the principles and practices used to protect computers and networks from unauthorized access and attacks.
Provides a comprehensive overview of cryptography and network security. It covers the principles and practices used to protect data and communications.
Provides a practical guide to hacking techniques. It valuable resource for anyone interested in learning how to exploit vulnerabilities and compromise systems.
Provides a basic overview of network security. It covers the principles and practices used to protect networks from unauthorized access and attacks.
Provides a basic overview of computer security. It covers the principles and practices used to protect computers and networks from unauthorized access and attacks.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Network Protocols for Security: SMB.
Network Protocols for Security: HTTP
Most relevant
Network Protocols for Security: ICMP
Most relevant
Network Protocols for Security: TCP and UDP
Most relevant
Network Protocols for Security: DNS
Most relevant
Network Protocols for Security: IPv4 and ARP
Most relevant
Threat Hunting: Network Hunting
Most relevant
IBM Security QRadar Functions and Capabilities
Most relevant
Check Point Jump Start: SMB Network Security
Most relevant
Security Event Triage: Monitoring Assets and Topology
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser