The Complete Wireshark Course: Go from Beginner to Advanced!
4.2 (2,986 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
88,794 students enrolled

The Complete Wireshark Course: Go from Beginner to Advanced!

Learn to use Wireshark as a networking professional including troubleshooting, analysis, and protocol development!
4.2 (2,991 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
88,794 students enrolled
Created by Ermin Kreponic
Last updated 4/2016
English, Indonesian [Auto], 6 more
  • Italian [Auto]
  • Polish [Auto]
  • Portuguese [Auto]
  • Romanian [Auto]
  • Spanish [Auto]
  • Thai [Auto]
Current price: $135.99 Original price: $194.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 6.5 hours on-demand video
  • 2 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Use wireshark as an advanced user.
  • Apply successfully for network admin jobs.
  • Work as a freelancer using wireshark skills learned in this course.
  • See how to add a wireshark certificate to your LinkedIn profile!
  • Have a computer capable of running wireshark.
  • Consistent experience with accessing the internet and working online.

Wireshark is much easier to learn when you take this course and try everything you see for yourself! Wireshark is a free open-source packet analyzer that is the number one tool for network analysis, troubleshooting, software and communications protocol development, and related education in networking. Knowing Wireshark gives you the ability to successfully apply for network administrator jobs and easily earn money as a freelancer online because Wireshark is an in demand skill!

Use this course to speed up your learning with Wireshark with hands on tutorials showing you exactly what you can do in Wireshark founded on explanations of basic network terminology, installing Wireshark, and a review of the basic functions. The course begins with the basics and continues to dive deeper allowing you to follow along and try everything you see for yourself!

You should act on your feelings of love, hope, and faith to take this course now if you want to learn a valuable skill to use in your own company or to make money as a freelancer or employee working in a network administration job!

Who this course is for:
  • Network administrators looking to build deeper knowledge of wireshark.
  • Entrepreneurs desiring to learn more about network protocols.
  • Freelancers wishing to add an in demand skill to their profile.
Course content
Expand all 41 lectures 06:43:18
+ Welcome to Wireshark! What is it, why should you learn it, and networking basics
5 lectures 35:15

Introduction to Wireshark and a brief overview of the course, stating what one can learn from it along with giving some general info on the subject of network traffic.

Preview 04:23

Some basic concepts that will come in handy during the course, such as IP addresses, MAC addresses, ports, etc. This tutorial deals with essential terms and concepts needed in order for one to be able to understand the network traffic which will later be captured in Wireshark.

Preview 14:27

Here you can learn the layout of the OSI model and what sort of traffic can be found at each of the seven layers. Very useful to know not only as general knowledge, but rather instead to save one a great deal of time when going through information contained within the packets.

OSI model: What it is, different layers, and why is it important to understand.
How to get a certificate + add Wireshark to your LinkedIn profile certifications
How to get help with questions and solve problems in the course.
1 page
+ Getting Started with Wireshark. How to set it up, install, and the interface.
3 lectures 44:41

Here one may see how Wireshark program is installed via Linux terminal. It covers things such as, searching for Wireshark in the repositories, set of terminal commands needed for the installation process and it also deals with possible problems that might occur during the installation.

Wireshark installation and setup (Linux environment).

Introducing a user to Wireshark interface and explaining its various functionalities.

Wireshark interface

Dealing with a wide range of options such as: interface appearance and layout configuration, filter options, capture modes and so forth.

Deeper into the wireshark interface
+ Key functions for use within wireshark.
4 lectures 34:35

Dealing with the subject of Wireshark filters, to be more precise this tutorial explain how protocol filters can be applied in order to reduce the amount of redundant packets.

Protocol filters

Introducing IP and port filtering options along with explaining the proper syntax to be used. And demonstrating how the capture process can be manipulated to only provide packets which fit specified ranges of filters.

IP and port filtering

In depth analysis of HTTP packets. Examining the values of various fields of the Wireshark output and looking at the content of an HTTP packet, understanding what sort of information does it contain and what useful things we can extract from it.

HTTP packet analysis

Demonstration of how unencrypted traffic can be potentially dangerous, and what sort of sensitive information can be extracted from it.

Demonstrating how credentials can be stolen over insecure networks.
+ Firewalls and Unauthorized Traffic with wireshark.
2 lectures 12:51

Demonstrating how Wireshark can be used to confirm and monitor firewall settings and pointing out the similarities between a firewall in Linux (iptables) and Wireshark in terms of traffic filtering.

Wireshark and Linux firewall interaction

Short exercise to demonstrate how to spot suspicious or unauthorized traffic and how to put an end to it. Deals with subjects such as: spotting suspicious packets, determining their cause and putting a stop to such traffic.

Demonstration of detecting unauthorized traffic
+ Introduction to Wireshark Command Line Interface and Tshark.
7 lectures 01:00:50
Wireshark command line interface overview.
Wireshark CLI first usage introduction.
T Shark file output.
Tshark timer limits.
Tshark splitting output files.
Difference between display and capture filters in CLI
Field separation.
+ Network Card Modes: Motioning and Remote Capture.
5 lectures 47:56
Network card modes walk through.
How to enable monitor mode.
Deeper into enabling monitor mode.
Capturing remote traffic.
Decrypting remote wireless traffic.
+ Tshark Output Formatting.
2 lectures 18:02
Formatting output to a .csv file.
Exporting packet contents.
+ Wireshark and Nmap Interaction.
2 lectures 18:35
Wireshark and Nmap interaction introduction.
Deeper into the Wireshark and Nmap interaction.
+ Tunneling Wireshark Traffic Online.
4 lectures 31:50
SSH tunneling to Wireshark introduction.
SSH tunneling to Wireshark second steps.
More about SSH tunneling to Wireshark.
Finishing SSH tunneling to Wireshark.
+ Traffic monitoring on a proxy server, log file overview + wireshark live capture
6 lectures 01:35:16
Proxy server traffic monitoring part 1
Proxy server traffic monitoring part 2
Proxy server traffic monitoring part 3
Proxy server traffic monitoring part 4
Proxy server traffic monitoring part 5
Proxy server traffic monitoring part 6