Course Highlights
  • Get to know the key features of Wireshark
  • Recognize the essential components of network communication
  • Explore the different methods of setting up a packet capture
  • Analyze packets using the Wireshark tool
  • Analyze client to server communication with Wireshark
  • Examine network traffic and identify potentially malicious traffic
  • Examine the data within the network and how it shows up in Wireshark
Curriculum

1 Topic
Introduction

3 Topics
Download and Install Wireshark
Work with Wireshark
Review the First Packet capture in Wireshark.

6 Topics
Introduction
Analyze Client to Server Communication with the Wireshark User Interface.
Lecture 6 updated
Your first protocols
Examine protocol packets within the Wireshark tool.
Network communication quiz

5 Topics
Introduction
Protocol Analysis at the network level using Wireshark
Interpreting Connections and Protocols
Intermediate Protocol Analysis of static captures using Wireshark.
TCP/IP Foundation Quiz

3 Topics
Introduction
Live capture exercise
Analyzing the live capture using Wireshark.

5 Topics
Introduction
Saving the capture to a file
Advanced Capture Methods
Advanced Capture Scenario Analysis Methods With Wireshark.
Working with capture files within Wireshark

2 Topics
Introduction
Creating Wireshark filters

3 Topics
Introduction
Attacking the network communication and identifying artifacts with Wireshark
Applying your skills to identify potential incidents within Wireshark captures

4 Topics
Bonus-File1 capture file
Bonus-File1 Solution
Bonus File2 capture File
Bonus-File2 Solution

8 Topics
The first step of professional hacking scanning methodology!
The second step of the professional hacking methodology
The third step of the professional hacking methodology
The fourth step of the professional hacking methodology
The fifth step of the professional hacking methodology
The sixth step of the professional hacking methodology
Working with Malware Capture Files
Lecture 35: File extraction using Wireshark

  Write a Review

Start Using Wireshark to Hack like a Pro

Go to Paid Course