Analyzing and Defending Networks with Wireshark
This course provides students a complete foundational understanding of the process for conducting network protocol analysis, an essential skill required for a number of high value careers in the cybersecurity field.
1
Segment - 01 - Introduction
2
Segment - 02 - Download and Install Wireshark
Segment - 03 - Work with Wireshark
Segment - 04 - Review the first packet capture in Wireshark
3
Segment - 05 - Introduction
Segment - 06 - Analyze Client to Server Communication with the Wireshark User Interface.
Segment - 07 - Your first protocols
4
Segment - 08 - Introduction
Segment - 09 - Protocol Analysis at the Network Level using Wireshark
Segment - 10 - Interpreting Connections and Protocols
Segment - 11 - Intermediate Protocol Analysis of static captures using Wireshark.
5
Segment - 12 - Introduction
Segment - 13 - Live capture exercise
Segment - 14 - Analyzing the live capture using Wireshark.
6
Segment - 15 - Introduction
Segment - 16 - Saving the capture to a file
Segment - 17 - Advanced Capture Methods
Segment - 18 - Advanced Capture Scenario Analysis Methods With Wireshark.
7
Segment - 19 - Introduction
Segment - 20 - Creating Wireshark filters
8
Segment - 21 - Introduction
Segment - 22 - Attacking the network communication and identifying artifacts with Wireshark
Segment - 23 - Applying your skills to identify potential incidents within Wireshark captures
9
Segment - 24 - Bonus-File1 capture file
Segment - 25 - Bonus-File1 Solution
Segment - 26 - Bonus File2 capture File
Segment - 27 - Bonus-File2 Solution
10
Segment - 28 - The first step of professional hacking scanning methodology
Segment - 29 - The second step of the professional hacking methodology
Segment - 30 - The third step of the professional hacking methodology
Segment - 31 - The fourth step of the professional hacking methodology
Segment - 32 - The fifth step of the professional hacking methodology
Segment - 33 - The sixth step of the professional hacking methodology