Mastering Wireshark 3

Mastering Wireshark 3

Step up your network analysis and network forensics skills with Wireshark

Bestseller
Created By: Rick Bodnar
16.05 9.62

About This Course

Mastering Wireshark 3 (2nd Edition) will help you gain expertise in securing your network. As you progress through the course, you will discover different and important ways to create, use, capture, and display filters.

Learn to master Wireshark's features, analyze different layers of your network protocol, and search for abnormality in your network traffic. The course focuses on packet analysis for security tasks, command-line utilities, and tools that manage trace files.
You will delve into analyzing applications aimed primarily at web browsing; master commands that can also be set up and configured to run from the command prompt; and learn to use the new feature in Cisco routers and switches to capture packets directly from devices and mirror (SPAN) ports. Lastly, you'll learn to expand upon the capabilities and functions of Wireshark plugins and APIs and build on your Python skills by using PyShark to modify how Wireshark captures and filters packets.

By the end of this course, you'll have learned to customize Wireshark in-depth for network security analysis using commonly used protocols and to configure it effectively for troubleshooting and daily monitoring purposes.

Code files for this course are available here: https://github.com/PacktPublishing/Mastering-Wireshark-3-2nd-Edition-

Other Information

  • Certificate will provided in this course on Completion
  • Full lifetime access
  • Available on Mobile & Laptop

What Students Will Learn In Your Course?

  • Understand how to use Wireshark to help troubleshoot dropped packets, latency issues, and malicious activity on your network
  • Learn to capture and analyze network traffic to understand what is happening on your network.
  • Troubleshoot network problems by analyzing network latency, performance, and availability. Detect, diagnose, and resolve network performance issues.
  • Examine security issues to protect your network from malicious code and network vulnerabilities.
  • Verify network communications to analyze your network strength and connections and ensure good network quality.
  • Analyze network protocols to capture data for further analysis and understand of the technical means necessary packets.
  • Analyze application protocols to troubleshoot network problems and use them to examine security problems.
  • Expand Wireshark's capabilities and functions with plugins and APIs.
  • Use PyShark to modify how Wireshark captures and filters packets.

Are There Any Course Requirements Or Prerequisites?

Knowledge of Python is required to learn PyShark and familiarity with Wireshark is assumed.

Who Are Your Target Students?

This course assumes that the viewer is already familiar with the OSI and TCP/IP models and only briefly covers the specifics required to understand the course.

Course Content

  • 44 lectures
  • 03:41:39
  • The Course Overview
    00:04:57
  • Installation and Customization
    00:04:26
  • Preferences and Profiles
    00:08:23
  • Overview of GUI
    00:11:28
  • Colorizing Traffic
    00:07:57
  • Wireshark Requirements and Platforms
    00:05:44
  • Sources of Packet Captures
    00:12:22
  • Capturing Packets
    00:07:04
  • View Settings and Saving Packet Captures
    00:10:53
  • Capture Filters
    00:07:28
  • Time Values and Summaries
    00:06:28
  • Trace File Statistics
    00:04:00
  • Expert System Usage
    00:02:45
  • Display Filters
    00:02:26
  • Display Filter Macros
    00:06:10
  • Display Filter Expression
    00:03:13
  • Conversation Filter
    00:02:21
  • Exporting Captures
    00:05:50
  • Follow Protocol Streams
    00:04:10
  • Reviewing Statistics
    00:04:25
  • Telephony and Wireless
    00:04:27
  • UDP Overview and Analysis
    00:04:08
  • TCP Overview and Analysis
    00:04:10
  • Graph I/O Rates and TCP Trends
    00:04:04
  • DHCP Analysis
    00:03:47
  • HTTP Analysis
    00:03:23
  • FTP Analysis
    00:04:10
  • VoIP Analysis
    00:04:39
  • Sample Traffic Captures
    00:03:06
  • Why Use the Command-Line
    00:03:59
  • Wireshark from Command-Line
    00:02:41
  • Running TShark
    00:07:06
  • Running Dumpcap
    00:05:57
  • Running TShark with PowerShell
    00:04:24
  • Choosing What to Capture
    00:03:23
  • Capture Scenario
    00:02:29
  • Analyzing Scenario Traffic
    00:04:15
  • Capturing Options
    00:03:04
  • Optional Plugins
    00:04:48
  • Using Mirror (SPAN) Ports on Cisco Devices
    00:04:38
  • Prerequisites for Cisco Packet Capture
    00:03:20
  • Using Cisco Packet Capture
    00:04:36
  • Wireshark Plugins and API
    00:03:09
  • Analyzing Networking Traffic Using the PyShark Library
    00:05:26
Image

Packt Publication

  • 4.4 (5)
  • 7 Reviews
  • 5 Students
  • 935 Courses