Course Overview

Wireshark is a free and open-source network traffic analyzer. Compared to other tools, Wireshark enables users to examine network packets at a much deeper level. The analysis capabilities that Wireshark offers, which give a thorough understanding of the traffic, are what give it its true strength. It is used to troubleshoot network issues such as slow web servers and analyze HTTP traffic. Cybersecurity professionals often use Wireshark to trace connections, view the contents of suspect network transactions, and find bursts of network traffic.  

The course begins with learning the basics of Wireshark and WinPcap on the Windows platform. As you move on, you will learn to create a capture from a live network and use it to prove the importance of filtering in Wireshark. Further, you will explore expression tools to filter down example capture and examine a potential issue with the traffic. Next, you will learn to analyze a capture by viewing, filtering, and examining each network protocol layer. Subsequently, you will learn graph functions, time delays, and network problems. Next, you will learn the comparison between different capture techniques. Finally, you will have the ability to create your filtering codes by using the most efficient, fast, and easiest way on Wireshark. Thus, creating the exact true filtering code will not be trouble for you anymore. Further, you will learn to troubleshoot specific problems by checking TCP errors and finding invalid retransmissions.   

By the end of the course, you will master the technique to find errors in proprietary protocol and implement them by solving them successfully. 

What You Will Learn

  • Familiarize with network analysis process and the key points of an effective network traffic
  • Understand about deep packet captures (PCAP) inspection and investigating of network traffic
  • Learn about advanced features of the Wireshark by focusing on packet-level details.
  • Detecting suspicious or malware infection activities and anomalies on the network such as unauthorized remote communications
  • Nmap Scans
  • ARP poisoning
  • and MITM attacks
  • etc.
  • Learn how to decrypt encrypted traffic and analyze traffic activity.
  • Understand about various filtering methods and create filtering codes in different ways

Program Curriculum

  • Why Do We Need to Perform Network Traffic Analysis?
  • Understanding the NTA Processes
  • OSI / TCP-IP Models Knowledge
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • Downloading and Installing Wireshark for Traffic Analysis
  • Wireshark GUI Walkthrough
  • The Features and Advantages of the Wireshark Application
  • Chapter 2 Quiz

  • Different Capture Techniques
  • Wireshark Interface and OSI Model
  • Network Traffic Analysis in Practice
  • Chapter 3 Quiz

  • Filtering Techniques
  • Protocol Details and Analysis
  • Finding and Coloring Packets
  • Exporting Objects
  • Chapter 4 Quiz

  • Discovery of Nmap Scans
  • Discovery of ARP Poisoning and MITM Attacks
  • Investigating the Anomalous Packets -DNS and ICMP Tunneling
  • Chapter 5 Quiz

  • TCP Analysis -Three-Way Handshake
  • Identifying Hosts: DHCP, NetBIOS, and Kerberos
  • FTP Analysis
  • HTTP Analysis - Log4j Attacks
  • Chapter 6 Quiz

  • SSL/TLS Protocols and TLS Handshake
  • Decrypting HTTPS Traffic
  • Decrypting RDP Traffic
  • Chapter 7 Quiz

  • IP Fragmentation and Reassembly
  • Path MTU Discovery with Wireshark
  • Chapter 8 Quiz

Conclusion

Load more modules

Instructor

Hüseyin Yaraş

Hüseyin Yaraş obtained System-Network Specialist training at Bahcesehir University's Wissen Academy after finishing his undergraduate degree in Computer Engineering. He worked as a Computer Engineer for a telecommunications business. During his working hours, he got expertise using Wireshark actively and regularly to solve network problems and he supported many collaborative companies during his work. Also, he is currently working in the field of Cyber Security. He got the opportunity to perform analysis and problem-solving with Wireshark in VoIP technology, where urgent and effective troubleshooting is a must. He believes that, aside from third-party tools, the human eye is still the most potent instrument in maintaining a safe and smooth network.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8