Network Security
This page will guide you with foundational network security principles and traffic analysis techniques to identify and investigate anomalies.
You will learn to use widely accepted tools (such as Wireshark, Zeek, Tshark, Snort, NetworkMiner) to analyse packet flows, identify intrusions, and address threats—transforming raw data into useful insights.
Whether it’s detecting covert command and control channels or probing DNS data exfiltration, these skills are vital for modern SOC analysts and network defenders.
This content is adapted from TryHackMe's Network Security and Traffic Analysis .
- Network Traffic Analysis Fundamentals
- Snort
- Snort in Action: Crafting IDS Rules for Real Threats
- SOC Simulation: Write Snort Rules to Stop Live Attacks
- Hands-On Network Forensics: Decoding PCAPs with NetworkMiner
- Network Monitoring And Threat Detection Using Zeek
- Zeek Threat Hunting: Analyse DNS, Phishing & Log4j Attacks
- Brim
- Analysing Network Protocols and PCAPs Using Wireshark
- Wireshark Packet Analysis: Filtering, Statistics & Protocol Investigation
- Network Investigation with Wireshark: From DHCP to HTTPS Decryption
- Analysing Network Protocols and PCAPs Using Tshark
- Beyond Wireshark: Automate Traffic Analysis with TShark
- TShark Teamwork Challenge I
- TShark Teamwork Challenge II