Course curriculum

  • 1

    Module 1 - Course Overview

    • Segment - 01 - Introduction
  • 2

    Module 2 - Course Setup: First Steps of Protocol Analysis

    • Segment - 02 - Download and Install Wireshark
    • Segment - 03 - Work with Wireshark
    • Segment - 04 - Review the first packet capture in Wireshark
  • 3

    Module 3 - Network Communication at the Packet Level

    • Segment - 05 - Introduction
    • Segment - 06 - Analyze Client to Server Communication with the Wireshark User Interface.
    • Segment - 07 - Your first protocols
  • 4

    Module 4 - TCP/IP Foundation

    • Segment - 08 - Introduction
    • Segment - 09 - Protocol Analysis at the Network Level using Wireshark
    • Segment - 10 - Interpreting Connections and Protocols
    • Segment - 11 - Intermediate Protocol Analysis of static captures using Wireshark.
  • 5

    Module 5 - Starting your first capture

    • Segment - 12 - Introduction
    • Segment - 13 - Live capture exercise
    • Segment - 14 - Analyzing the live capture using Wireshark.
  • 6

    Module 6 - Working with Capture Files in Wireshark

    • Segment - 15 - Introduction
    • Segment - 16 - Saving the capture to a file
    • Segment - 17 - Advanced Capture Methods
    • Segment - 18 - Advanced Capture Scenario Analysis Methods With Wireshark.
  • 7

    Module 7 - Analyzing Packet Captures

    • Segment - 19 - Introduction
    • Segment - 20 - Creating Wireshark filters
  • 8

    Module 8 - Examining Protocol Communication

    • Segment - 21 - Introduction
    • Segment - 22 - Attacking the network communication and identifying artifacts with Wireshark
    • Segment - 23 - Applying your skills to identify potential incidents within Wireshark captures
  • 9

    Module 9 - Bonus Capture Files

    • Segment - 24 - Bonus-File1 capture file
    • Segment - 25 - Bonus-File1 Solution
    • Segment - 26 - Bonus File2 capture File
    • Segment - 27 - Bonus-File2 Solution
  • 10

    Module 10 - The Steps of Professional Hacking

    • Segment - 28 - The first step of professional hacking scanning methodology
    • Segment - 29 - The second step of the professional hacking methodology
    • Segment - 30 - The third step of the professional hacking methodology
    • Segment - 31 - The fourth step of the professional hacking methodology
    • Segment - 32 - The fifth step of the professional hacking methodology
    • Segment - 33 - The sixth step of the professional hacking methodology