Start Using Wireshark to Hack like a Pro

4.4
2 490 комментариев
Payment
Обучение платное
Certificate
Сертификация бесплатная
Duration
3.5 часа курса
О курсе

This course will cover the process for conducting protocol analysis. This will serve as a foundation for the skill required for a number of different types of careers. Protocol analysis is the technique of analyzing what is or has taken place on a network. This is used by Security Operations Center analysts as well as network forensics investigators.

We will take static capture files that you will be provided and show you how to analyze them within the Wireshark tool. You will learn ways to quickly identify anything that is abnormal within a network packet capture. This will provide you with the initial skills for intrusion analysis, and also malware tracking and monitoring.

-The course prepares the student for understanding network protocol analysis
-After the course you will have the initial skills for security or hacking classes 

- Anyone who wants to understand the foundation of security skills and have knowledge for analyzing network traffic as well as potential intrusions will benefit from this course. 

- This course is for beginners or people interested in learning about hacking and don't know where to start.

Программа
Course Overview
Learn the foundation of network protocol analysis with Wireshark.
Introduction
Learn the course format and get setup with supplemental files you will need to get hands on experience with Wireshark.
Course Setup: First Steps of Protocol Analysis
Download and install Wireshark. Get to know the user interface and review a capture file.
Download and Install Wireshark
Download and install Wireshark on a Windows platform
Work with Wireshark
Get to know the Wireshark interface.
Review the First Packet capture in Wireshark.
Maneuver the static packet capture File1.pcapng within Wireshark and interpret the information in the file. Become familiar with the three main display windows and how to analyze the packet information.
Network Communication at the Packet Level
Learn the essential components of network communication, and how to identify what takes place when you communicate within a network.
Introduction
Recognize the components of client to server interaction. Following the common sequences of network traffic from request to response            DNS to IP             IP to ARP
Analyze Client to Server Communication with the Wireshark User Interface.
Analyze the different components of client to server communication. Interpret DNS and ARP and what takes place on the network when these protocols communicate.
Your first protocols
Explore the main protocols on the network and build understanding of the components of ICMP, the composition of UDP and the characteristics of TCP communications.
Examine protocol packets within the Wireshark tool.
Assess the static capture file File1.pcapng. Examine the ICMP, UDP and TCP traffic within the file using the user interface of Wireshark.
Network communication quiz
In this quiz you will be tested on the components of network communication.
Требования
  • This course is for you if you have a basic understanding of the command line and general knowledge of what an IP address is and TCP/IP. You should also know about the 7 layers of OSI model.
Что Вы изучите?
  • Get to know the key features of Wireshark
  • Recognize the essential components of network communication
  • Explore the different methods of setting up a packet capture
  • Analyze packets using the Wireshark tool
  • Analyze client to server communication with Wireshark
  • Examine network traffic and identify potentially malicious traffic
  • Examine the data within the network and how it shows up in Wireshark
Лекторы
Kevin Cardwell
Kevin Cardwell
Computer Security Architect

Kevin Cardwell served as the leader of a 5 person DoD Red Team that achieved a 100% success rate at compromising systems and networks for six straight years. He has conducted over 500 security assessments across the globe. His expertise is in finding weaknesses and determining ways clients can mitigate or limit the impact of these weaknesses.

He spent 22 years in the U.S. Navy. He has worked as both software and systems engineer on a variety of Department of Defense projects and early on was chosen as a member of the project to bring Internet access to ships at sea. Following this highly successful project he was selected to head the team that built a Network Operations and Security Center (NOSC) that provided services to the commands ashore and ships at sea in the Norwegian Sea and Atlantic Ocean . He served as the Leading Chief of Information Security at the NOC for six years. While there he created a Strategy and Training plan for the development of an expert team that took personnel with little or no experience and built them into expert team members for manning of the NOSC.

He currently works as a free-lance consultant and provides consulting services for companies throughout the world, and as an advisor to numerous government entities within the US, Middle East, Africa, Asia and the UK . He is an Instructor, Technical Editor and Author for Computer Forensics, and Hacking courses. He is the author of the Center for Advanced Security and Training (CAST) Advanced Network Defense and Advanced Penetration Testing courses. He is technical editor of the Learning Tree Course Penetration Testing Techniques and Computer Forensics. He has presented at the Blackhat USA, Hacker Halted, ISSA and TakeDownCon conferences as well as many others. He has chaired the Cybercrime and Cyberdefense Summit in Oman and was Executive Chairman of the Oil and Gas Cyberdefense Summit. He is author of Building Virtual Pentesting Labs for Advanced Penetration Testing,  Advanced Penetration Testing for Highly Secured Environments 2nd Edition and Backtrack: Testing Wireless Network Security.  He holds a BS in Computer Science from National University in California and a MS in Software Engineering from the Southern Methodist University (SMU) in Texas. He developed the Strategy and Training Development Plan for the first Government CERT in the country of Oman that recently was rated as the top CERT for the Middle East. He serves as a professional training consultant to the Oman Information Technology Authority, and developed the team to man the first Commercial Security Operations Center in the country of Oman.  He has worked extensively with banks and financial institutions throughout the Middle East, Europe and the UK in the planning of a robust and secure architecture and implementing requirements to meet compliance. He currently provides consultancy to Commercial companies, governments, federal agencies, major banks and financial institutions throughout the globe.  Some of his recent consulting projects include the Muscat Securities Market (MSM), Petroleum Development Oman and the Central Bank of Oman. He designed and implemented the custom security baseline for the existing Oman Airport Management Company (OAMC) airports and the two new airports opening in 2016. He created custom security baselines for all of the Microsoft Operating Systems, Cisco devices as well as applications.  Additionally, he provides training and consultancy to the Oman CERT and the SOC team in monitoring and incident identification of intrusions and incidents within the Gulf region.  He holds the CEH, ECSA, LPT and a number of other certifications. 

Платформа
Udemy
Курсы Udemy подойдут для профессионального развития. Платформа устроена таким образом, что эксперты сами запускают курсы. Все материалы передаются в пожизненный доступ. На этой платформе можно найти курс, без преувеличений, на любую тему – начиная от тьюториала по какой-то камере и заканчивая теоретическим курсом по управлению финансовыми рисками. Язык и формат обучения устанавливается преподавателем, поэтому стоит внимательно изучить информацию о курсе перед покупкой.
Рейтинг
4.4
1 516
649
249
51
30