Scroll to top button
Learn Wireshark
(WRSHK.AJ1)
This course includes
Lessons
TestPrep
LiveLab
Learn Wireshark
Lessons
-
17+ Lessons
-
159+ Exercises
-
80+ Quizzes
-
111+ Flashcards
-
111+ Glossary of terms
TestPrep
-
50+ Pre Assessment Questions
-
50+ Post Assessment Questions
LiveLab
-
22+ LiveLab
-
22+ Video tutorials
-
32+ Minutes
Video Lessons
-
20+ Videos
-
01:57+ Hours
- Who this course is for?
- What does this course cover?
- To get the most out of this course
- Reviewing packet analysis
- Recognizing who benefits from using packet analysis
- Identifying where to use packet analysis
- Outlining when to use packet analysis
- Getting to know Wireshark
- Summary
- Discovering the beginnings of today's Wireshark
- Examining the Wireshark interface
- Understanding the phases of packet analysis
- Using command-line tools
- Summary
- Discovering support for different OS
- Comparing different capture engines
- Performing a standard Windows installation
- Reviewing the resources available at Wireshark.org
- Summary
- Understanding the Wireshark welcome screen
- Exploring the File menu
- Discovering the Edit menu
- Exploring the View menu
- Summary
- Reviewing the network architecture
- Learning various capture methods
- Tapping into the stream
- Realizing the importance of baselining
- Summary
- Personalizing the layout and general appearance
- Creating a tailored configuration profile
- Adjusting columns, font, and colors
- Adding comments
- Modifying complex expressions
- Summary
- Filtering network traffic
- Comprehending display filters
- Creating capture filters
- Understanding the expression builder
- Discovering shortcuts and handy filters
- Summary
- Comprehending the OSI model
- Discovering the purpose, protocols, and PDUs
- Exploring the encapsulation process
- Demonstrating frame formation in Wireshark
- Summary
- Reviewing the purpose of the transport layer
- Describing TCP
- Examining the eleven-field TCP header
- Understanding UDP
- Discovering the four-field UDP header
- Summary
- Dissecting the three-way handshake
- Learning TCP options
- Understanding TCP protocol preferences
- Tearing down a connection
- Summary
- Understanding the purpose of the IP
- Outlining IPv4
- Exploring IPv6
- Editing protocol preferences
- Discovering tunneling protocols
- Summary
- Understanding the purpose of ICMP
- Dissecting ICMPv4 and ICMPv6
- Sending ICMP messages
- Evaluating type and code values
- Configuring firewall rules
- Summary
- Understanding the role and purpose of ARP
- Exploring ARP headers and fields
- Examining different types of ARP
- Analyzing ARP attacks
- Summary
- Analyzing latency issues
- Understanding the coloring rules
- Exploring the Intelligent Scrollbar
- Discovering the expert system
- Summary
- Discovering ways to subset traffic
- Understanding options to save a file
- Recognizing ways to export components
- Identifying why and how to add comments
- Summary
- Diving into an overview of CS
- Sharing captures in CS
- Outlining the various filters and graphs
- Evaluating the different analysis tools
- Discovering where to find sample captures
- Summary
Hands on Activities (Live Labs)
- Splitting a File and Work with Filtered File Sets
- Using Tshark to Extract HTTP GET Requests
- Using Tshark to Capture File Sets with an Autostop Condition
- Capturing and Classifying Background Traffic
- Opening a Network Monitor .cap File
- Capturing File Sets
- Using a Ring Buffer to Conserve Drive Space
- Adding a Column to Display Coloring Rules in Use
- Adding the HTTP Host Field as a Column
- Using a Default Filter as a Seed for a New Filter
- Creating, Saving, and Applying a DNS Capture Filter
- Applying Filters to Locate a Set of Keywords in a Trace File
- Exporting a Single TCP Conversation
- Applying Filter on HTTP 404 Responses
- Filtering Traffic to or from Online Backup Subnets
- Filtering HTTP Traffic the Right Way
- Locating TCP Connection Attempts to a Client
- Using Packets to Build a Picture of a Network
- Investigating an arp Cache
- Building a Coloring Rule to Highlight FTP User Names, Passwords, and More
- Exporting Malicious Redirection Packet Comments
- Reading Analysis Notes in a Malicious Redirection Trace File
×
Share with your friends and colleagues
We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies.
More information
Accept