Start Using Wireshark to Hack like a Pro

4.3 (2490)
Learning paid
3.5 hours course
Course by Udemy
What will you learn?
Get to know the key features of Wireshark
Recognize the essential components of network communication
Explore the different methods of setting up a packet capture
Analyze packets using the Wireshark tool
Analyze client to server communication with Wireshark
Examine network traffic and identify potentially malicious traffic
Examine the data within the network and how it shows up in Wireshark
About the course

This course will cover the process for conducting protocol analysis. This will serve as a foundation for the skill required for a number of different types of careers. Protocol analysis is the technique of analyzing what is or has taken place on a network. This is used by Security Operations Center analysts as well as network forensics investigators.

We will take static capture files that you will be provided and show you how to analyze them within the Wireshark tool. You will learn ways to quickly identify anything that is abnormal within a network packet capture. This will provide you with the initial skills for intrusion analysis, and also malware tracking and monitoring.

-The course prepares the student for understanding network protocol analysis
-After the course you will have the initial skills for security or hacking classes 

- Anyone who wants to understand the foundation of security skills and have knowledge for analyzing network traffic as well as potential intrusions will benefit from this course. 

- This course is for beginners or people interested in learning about hacking and don't know where to start.

Course Overview
Learn the foundation of network protocol analysis with Wireshark.
Learn the course format and get setup with supplemental files you will need to get hands on experience with Wireshark.
Course Setup: First Steps of Protocol Analysis
Download and install Wireshark. Get to know the user interface and review a capture file.
Download and Install Wireshark
Download and install Wireshark on a Windows platform
Work with Wireshark
Get to know the Wireshark interface.
Review the First Packet capture in Wireshark.
Maneuver the static packet capture File1.pcapng within Wireshark and interpret the information in the file. Become familiar with the three main display windows and how to analyze the packet information.
Network Communication at the Packet Level
Learn the essential components of network communication, and how to identify what takes place when you communicate within a network.
Recognize the components of client to server interaction. Following the common sequences of network traffic from request to response            DNS to IP             IP to ARP
Analyze Client to Server Communication with the Wireshark User Interface.
Analyze the different components of client to server communication. Interpret DNS and ARP and what takes place on the network when these protocols communicate.
Your first protocols
Explore the main protocols on the network and build understanding of the components of ICMP, the composition of UDP and the characteristics of TCP communications.
Examine protocol packets within the Wireshark tool.
Assess the static capture file File1.pcapng. Examine the ICMP, UDP and TCP traffic within the file using the user interface of Wireshark.
Network communication quiz
In this quiz you will be tested on the components of network communication.
  • This course is for you if you have a basic understanding of the command line and general knowledge of what an IP address is and TCP/IP. You should also know about the 7 layers of OSI model.
Kevin Cardwell
Kevin Cardwell
Computer Security Architect
Udemy courses are suited to professional development. The platform is organized in such a way that it is experts themselves that decide the topic and when the course will start. All supporting documents are made available to you for lifetime access. On this platform, you can find a course on about any subject, and that is no exaggeration – from a tutorial on how to ride a motorcycle, to managing the financial markets. The language and the course format are established by the teacher. This is why it is important to read the information about the course carefully before parting with any money.
Comments (2490)
Like any other website, konevy uses «cookies». These cookies are used to store information including visitor's preferences, and the pages on the website that the visitor accessed or visited. The information is used to optimize the users' experience by customizing our web page content based on visitors' browser type and/or other information. For more general information on cookies, please read the «What Are Cookies» article on Cookie Consent website.