Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Software Development Tools No-Code Development
Business
Entrepreneurship Communication Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certifications Network & Security Hardware Operating Systems & Servers Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Paid Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement & Gardening Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition & Diet Yoga Mental Health Martial Arts & Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Learning Teacher Training Test Prep Other Teaching & Academics
Web Development JavaScript React Angular CSS Node.Js PHP HTML5 Vue JS
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Amazon AWS Cisco CCNA CompTIA Security+ Microsoft AZ-900
Microsoft Power BI SQL Tableau Data Modeling Business Analysis Business Intelligence MySQL Qlik Sense Data Analysis
Unity Unreal Engine Game Development Fundamentals C# 3D Game Development C++ Unreal Engine Blueprints 2D Game Development Mobile Game Development
Google Flutter iOS Development Android Development Swift React Native Dart (programming language) Kotlin Mobile App Development SwiftUI
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting Canva InDesign Character Design Procreate Digital Illustration App
Life Coach Training Neuro-Linguistic Programming Personal Development Personal Transformation Life Purpose Mindfulness Sound Therapy Meditation Coaching
Business Fundamentals Entrepreneurship Fundamentals Freelancing Business Strategy Startup Business Plan Online Business Blogging Leadership
Digital Marketing Social Media Marketing Marketing Strategy Internet Marketing Google Analytics Copywriting Email Marketing Startup YouTube Marketing

IT & SoftwareNetwork & SecurityWireshark

Network Protocol Analysis Using Wireshark Part-1

You will effectively be able to use Wireshark and troubleshoot networks with a understanding on how protocols work !
Rating: 4.2 out of 54.2 (119 ratings)
15,913 students
Created by Vinod Senthil
Last updated 3/2021
English
English [Auto]

What you'll learn

  • Learn Network Protocols
  • Wireshark
  • Understand TCP/IP Communications
  • Traffic Analysis
  • The Network Packet Analysis (NPA) course starts with the fundamental networking basic concepts, networking methodologies. This course will drive you into necessary software tools to analyze network data packet traffic for the purpose of intrusion and threat detection, network defense and primarily to identify offensive operations by attackers. NPA is an outstanding industry standard training program for participant who are interested in analyzing traffic to learn how a program or application works using network, or determining if a networked device is infected with malware or intruders. If you perform incident response or are involved with investigations, this course will help you take your skills to the next level. Wireshark will be used as the primary analysis tool.

Requirements

  • Basic knowledge of Networking
  • Understanding TCP/IP fundamentals.
  • A computer with Internet connection

Description

What is network protocol ?

A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure, or design.

What is wireshark ?

Wireshark is a GUI network protocol analyzer. It lets you interactively browse packet data from a live network or from a previously saved capture file. Wireshark's native capture file format is pcapng format, or pcap which is also the format used by tcpdump and various other tools.

Wireshark can also be used to intercept and analyze encrypted TLS traffic. Symmetric session keys are stored in the browser, and with the appropriate browser setting (and permission and knowledge of the user) an administrator can load those session keys into Wireshark and examine unencrypted web traffic. Wireshark comes with graphical tools to visualize the statistics. This makes it easy to spot general trends, and to present findings to less-technical management. This is a practical course, so you will explore more.

What will you learn ?

In this course, you will first be introduced to the Wireshark tool. Once you get to know the different features and navigation in Wireshark, we will get into the Analysis of Protocol Structure, where the following protocols would be explained in detail,

  • ARP

  • ICMP

  • IP

  • UDP

  • TCP

  • DHCP

  • DNS

  • HTTP

  • FTP

Who this course is for:

  • Network Engineer
  • Computer Forensics/Digital Forensics Professionals
  • Incident Response Personnel
  • Information Security Professionals
  • IT Managers
  • Law Enforcement Personnel
  • Legal Professionals
  • Network Administrators and Architects
  • System Administrators

Instructor

Vinod Senthil
Cyber Security Expert
Vinod Senthil
  • 4.0 Instructor Rating
  • 250 Reviews
  • 31,339 Students
  • 8 Courses

A Man on a Mission :

Vinod has dedicated his life to his cause. Whether it be teaching a friend or creating awareness within the community, he considers each small act one step closer towards his dream of creating a secure online environment. This kindled his spirit to teach the younger generation and propagate his knowledge to his peers. He started out by teaching students and professionals from colleges and corporates across India. He has trained over 60,000 people in person in these institutions. Then, the thought struck him that he could reach even more people online.As of May 2020, Vinod is the author of 13 widely subscribed online courses on cybersecurity. Online, Vinod’s tutorage has had a wider impact. In the ten years since he first established infySEC, he has tutored over 10 lakh personnel. One could easily find him on leading online certification platforms such as Udemy and Simplilearn. Hacking defines who Vinod is and he simply enjoys imparting his knowledge onto others. Through his work, explicitly and implicitly, he has transformed the lives of many and is elated to continue doing it.


Vinod's Accolades

Vinod has a number of accolades to his name but chief among them and those of which he fondly recalls are three instances of him being appreciated by global leaders for pursuing his passion in cybersecurity.

* Vinod has been congratulated personally by David Filo, co-founder of Yahoo! for his contribution to improving the cyberspace.

* For his exceptional bug detection skills and exemplary work towards aiding security, he was congratulated by Bill Gates, co-founder of the Microsoft Corporation.

* In recognition of his contributions to the government, Vinod was congratulated by Mr. N. Rangaswamy, the Ex-Chief Minister of Pondicherry.


Dignified Speaker at Cybersecurity Conferences, TEDx Organizer, Educationalist, and Cybersecurity Consultant

Vinod is one of India’s most recognized and accomplished cybersecurity experts. He has immensely contributed to the security of the cyberspace by assisting countless corporations, and governmental organizations. He currently holds 13 world records for conducting the largest information security gathering for the longest duration. He is highly sought-after in the industry for his mastery over identifying and developing effective counter-measures against sophisticated hacking. He has conducted several awareness drives in collaboration with the government and media and has multiple accolades to his name.

Vinod’s cybersecurity expeditions span over 15 years, in which duration he has built infySEC, a firm that initially began by offering cybersecurity training. It then grew into a cybersecurity consultancy firm for multinational corporates and cyber defence wings of various governments. Finally, infySEC evolved into a firm that develops futuristic cloud-based cybersecurity products whose clients range from Startups and MSMEs to Fortune 500 companies.

Vinod always had the vision to fortify security in the cyberspace. He says that there are two kinds of people in the world. Those who know that they have been compromised and the others who are oblivious to the fact that they’ve been compromised. Vinod’s work essentially tries to educate people enough for them to safeguard themselves from malicious hackers.


Unravelling His Life

Vinod Featured on Cybersecurity Talk Shows & Awareness Programmes & News

Vinod has been featured in several online and media channels where he demonstrates what it means to be a hacker and the hacked. He has collaborated with NDTV in the past to illustrate wardriving and credit card skimming to help curb cyber thefts. He has also regularly appeared in ‘Cyber Thirai,’ a program on Puthiya Thalaimurai, a leading South Indian news channel. The program ponders on the measures one should take to protect themselves from cyber assailants.

Vinod is an inspirational speaker who has been detrimental in clearing the misconceptions about hacking and cybersecurity. His online interviews and speeches on YouTube channels like Tech Talkies, Josh Talks, SAM Talks, and LIFANTASTIK among others give a general overview of what cybersecurity is, what he’s been doing so far to improve the space and the current trends in cybersecurity.


Cybersecurity Influencer Trusted by the Silicon Valley

Vinod has discovered bugs, glitches, gimmicks, implementation flaws as well as threatening inadequacies in security in major websites and software of Silicon Valley corporates and technology firms. Subsequently, he has also aided them in rectifying these shortcomings and improving the overall security of their systems.

Vinod firmly believes that technology can make our lives easier, provided the technology assures uncompromising security – something that may seem far-fetched in today’s hack-prone tech industry, but it is more possible than sighting a unicorn. He has proved that it is possible through rigorous penetration testing. His ethical hacking and his bug bounty hunting escapades has helped many notable firms to take note of the inadequacies in their applications and software prior to them being exploited by malicious hackers.

“If you think technology can solve your security problems, you don’t know technology, and you also don’t know security.”


Vinod’s Contributions to Cyber Security

As an ethical hacker, Vinod loves what he does. From discovering zero-day vulnerabilities that have a zero-day time interval between discovery and exploitation to session hijacking where a cookie is predicted or sniffed and then exploited, to various SQL injection vulnerabilities, Vinod has discovered and reported critical points of entry and inconspicuous flaws in WordPress, Joomla, BWNL, W3Schools, BitDefender, and popular e-Commerce Portals. Had these vulnerabilities been left undetected, they could have adversely affected the lives of millions of people.

No system, software, application or network is impregnable at first, and there is always a risk of exposure to attack. But the attack surface can be made so insignificant through practice and persistence. By employing proven security precautions, and their sustained maintenance, any system, software, application or network can eventually become resilient. Security, in a sense, is like walking on a rope strung tightly across a valley. One must balance out the risks associated with security flaws as soon as they are discovered and keep moving to find another risk before it is exploited.


About the Casual side of Vinod :

I am vino, I'm universal...I enjoy all new things and try to see beauty in everything. I Grew up as a computer nerd all my life , love hard core gaming , Network and Security. I grew up learning that love is one of the greatest gift one can give.That is what I live by. I have so many passion few of them being :computer gaming , teaching, playing with my doggy , chatting and doing little photography. I am also a big movie buff, I don't get involved in politics or religion, simply because it's a never ending argument. I know when to laugh and I know when to be serious.Creating that perfect balance is difficult, but I think I found a loop hole . I am obsessed with trekking, cycling , hiking , skating and basically anything that gives me excuse to be outside, enjoying our natural world. I often fantasize about disappearing to some small Island and living out my days enjoying the nature's beauty, never wearing a shoes and licensing out my life's work. I love family, friends and myself more than anything else , ofcourse not to miss out on my doggie - harry.


Certifications earned :

• ISACA - CISA  (Certified Information Security Auditor)

• ISACA - CISM  (Certified Information Security Manager)

• ISACA - CDPSE (Certified Data Privacy Solutions Engineer)

• SANS - GIAC Certified Intrusion Analyst (SANS - GCIA)

• Certified Ethical Hacker (CEH)

• Certified Hacker and Forensics Investigator (CHFI)

• Check Point Certified Security Administrator (CCSA)

• Oracle Certified Associates (OCA)

• Information Technology Infrastructure Library (ITIL)

• Microsoft Certified Professional(MCP)

Top companies choose Udemy Business to build in-demand career skills.
NasdaqVolkswagenBoxNetAppEventbrite
  • Udemy Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Investors
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Accessibility statement
Udemy
© 2022 Udemy, Inc.