Work as a freelancer using wireshark skills learned in this course.
Utilize wireshark in network pentest
Find sensitive data in wireshark captures
Basic network knowledge
Basic network protocols
Wireshark is a popular and powerful tool used to analyze the amount of bits and bytes that are flowing through a network. Wireshark deals with the second to seventh layer of network protocols, and the analysis made is presented in a human readable form.
This course will cover wireshark from the eyes of an ethical hacker. Wireshark in commonly used by malware analyzers, blue teams, and other security defenders. This tool can also be used by hackers to perform malicious actions. This course will teach you how to use wireshark in an offensive way to hack your targets.
Be prepaid to bring your grey hat when taking this course!
My name is Alex Thomas. I have been a professional pentester for three years and have a Masters degree from Dakota State University. I first started down the security path when I was a teenager by participating in CTFs. In my spare time I enjoy programing, building robotics, and of course playing CTF and bug bounties.