Complete Guide to Network Analysis with Wireshark 2.6

3.6 (6)
Онлайн-курс
Payment
Обучение платное
Language
Not set
Duration
6 часов курса
Курс от Udemy
Чему вы научились?
Discover the key features of Wireshark enabling you to analyze your packet capture.
Navigate through, split, and work with large traffic files
Use the TCP/IP Resolution Flowchart to identify possible communication faults
Create statistical charts and graphs to pinpoint performance issues
Analyzing different layers of the network protocol, and also looking in to its security.
Network switching, through IP, and then move on to Networking performance problems.
Decrypt encrypted wireless traffic and secure network to keep track of malware.
О курсе

Wireshark is the world's foremost & most widely-used network protocol analyzer, which helps you monitor activities on your network at a microscopic level. It is also used for network troubleshooting, analysis, software, and communications protocol development.

With this hands-on practical course, you'll start with basics of wireshark to analyze data and solve problems which primarily focus on enhancing your network analysis and web traffic capture skills to build a strong secure foundation. Then you will be trained on Wireshark and TCP/IP communications analysis to identify the most common causes of performance problems in TCP/IP communications. Moving further, you'll be introduce to a command line-version of Wireshark which is tshark. Next, you will also learn about various types of network cyber attack and essential remedies & troubleshooting your network using Wireshark.

Contents and Overview

This training program includes 3 complete courses, carefully chosen to give you the most comprehensive training possible.

The first course, Analyzing Network Traffic with Wireshark 2.6 will give you real-world knowledge about all Wireshark topics followed by a step-by-step implementation guideline while showing you how to work on it practically . This course begins by installing Wireshark and familiarizing you with the GUI interface, then guides you through some important concepts to set up your own home/office lab, which will enable you to efficiently analyze data and solve problems. Throughout the course, we primarily focus on enhancing your network analysis and web traffic capture skills to build a strong secure foundation. By the end of the course, you will not only be comfortable working with Wireshark but also confident enough to implement in your day-to-day work life.

The second course, Wireshark Recipes will teach you to use Wireshark to identify the most common causes of performance problems in TCP/IP communications. You will develop a thorough understanding of how to use Wireshark efficiently to spot the primary sources of network performance problems, and you will prepare for the latest Wireshark certification exam.

The third course, Mastering Wireshark 2.6 starts setting up a Wireshark lab in the Windows and Linux operating systems. We dive into the overall process of packet capturing and Wireshark filters. Then, we introduce tshark, a command line-version of Wireshark, and we learn about various tshark commands. Later, we are introduced to various types of network cyber attack and essential remedies. We also go through an array of techniques to monitor and secure these attacks using Wireshark. Lastly, we cover network troubleshooting using Wireshark.Towards the end of the course, you'll use Wireshark efficiently to find primary sources of network performance problems and also different ways to secure networks.

About the Authors:

Mohammad Junaid, CCIE #43891, is an IT Networking Consultant with over four years' experience in the industry. He is currently based in the Middle East. He is specialized in networking fields which includes routing switching, security, and data center. He has worked with several large private and public-sector enterprises in planning, designing, and implementing IT solutions.

A computer and cyber security expert, Sunil Gupta consults in information technology with a focus on cyber security. He is an invited speaker for, and a member of, many key organizations. Sunil is a technology visionary and cyber security professional who thrives on solving complex problems. His career highlights include working with various companies, organizations, and products. His primary passion is cyber security, but he understands that, to be successful at securing an organization, you must have a detailed understanding of networks and related fields. He is passionate about customer service and his role as a cyber security expert, and always exceeds his clients' expectations. Sunil performs leading-edge security consulting and works in research and development as a security expert to advance state-of-the-art information systems security.

Требования
  • A basic familiarity with common network and application service terms and technologies is assumed.
Лекторы
Packt Publishing
Packt Publishing
Tech Knowledge in Motion
Платформа
/storage/img/providers/udemy.svg
Курсы Udemy подойдут для профессионального развития. Платформа устроена таким образом, что эксперты сами запускают курсы. Все материалы передаются в пожизненный доступ. На этой платформе можно найти курс, без преувеличений, на любую тему – начиная от тьюториала по какой-то камере и заканчивая теоретическим курсом по управлению финансовыми рисками. Язык и формат обучения устанавливается преподавателем, поэтому стоит внимательно изучить информацию о курсе перед покупкой.
Рейтинг
3.6
(3)
(0)
(1)
(0)
(2)
Комментарии (6)
Как и любой другой веб-сайт, konevy использует файлы cookie. Эти файлы используются для хранения информации, включая предпочтения посетителей и страницы веб-сайта, которые он/она посещал. Информация используется для того, чтобы подстроить содержимое нашей страницы под тип браузера пользователя и другие параметры и таким образом улучшить его пользовательский опыт. Для получения более подробной информации о файлах cookie, пожалуйста, прочтите статью «Что такое файлы cookie»