Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
Wireshark is much easier to learn when you take this course and try everything you see for yourself! Wireshark is a free open-source packet analyzer that is the number one tool for network analysis, troubleshooting, software and communications protocol development, and related education in networking. Knowing Wireshark gives you the ability to successfully apply for network administrator jobs and easily earn money as a freelancer online because Wireshark is an in demand skill!
Use this course to speed up your learning with Wireshark with hands on tutorials showing you exactly what you can do in Wireshark founded on explanations of basic network terminology, installing Wireshark, and a review of the basic functions. The course begins with the basics and continues to dive deeper allowing you to follow along and try everything you see for yourself!
You should act on your feelings of love, hope, and faith to take this course now if you want to learn a valuable skill to use in your own company or to make money as a freelancer or employee working in a network administration job!
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: Welcome to Wireshark! What is it, why should you learn it, and networking basics|
Introduction to Wireshark and a brief overview of the course, stating what one can learn from it along with giving some general info on the subject of network traffic.
Some basic concepts that will come in handy during the course, such as IP addresses, MAC addresses, ports, etc. This tutorial deals with essential terms and concepts needed in order for one to be able to understand the network traffic which will later be captured in Wireshark.
Here you can learn the layout of the OSI model and what sort of traffic can be found at each of the seven layers. Very useful to know not only as general knowledge, but rather instead to save one a great deal of time when going through information contained within the packets.
How to get a certificate + add Wireshark to your LinkedIn profile certifications
How to get help with questions and solve problems in the course.
|Section 2: Getting Started with Wireshark. How to set it up, install, and the interface.|
Here one may see how Wireshark program is installed via Linux terminal. It covers things such as, searching for Wireshark in the repositories, set of terminal commands needed for the installation process and it also deals with possible problems that might occur during the installation.
Introducing a user to Wireshark interface and explaining its various functionalities.
Dealing with a wide range of options such as: interface appearance and layout configuration, filter options, capture modes and so forth.
|Section 3: Key functions for use within wireshark.|
Dealing with the subject of Wireshark filters, to be more precise this tutorial explain how protocol filters can be applied in order to reduce the amount of redundant packets.
Introducing IP and port filtering options along with explaining the proper syntax to be used. And demonstrating how the capture process can be manipulated to only provide packets which fit specified ranges of filters.
In depth analysis of HTTP packets. Examining the values of various fields of the Wireshark output and looking at the content of an HTTP packet, understanding what sort of information does it contain and what useful things we can extract from it.
Demonstration of how unencrypted traffic can be potentially dangerous, and what sort of sensitive information can be extracted from it.
|Section 4: Firewalls and Unauthorized Traffic with wireshark.|
Demonstrating how Wireshark can be used to confirm and monitor firewall settings and pointing out the similarities between a firewall in Linux (iptables) and Wireshark in terms of traffic filtering.
Short exercise to demonstrate how to spot suspicious or unauthorized traffic and how to put an end to it. Deals with subjects such as: spotting suspicious packets, determining their cause and putting a stop to such traffic.
|Section 5: Introduction to Wireshark Command Line Interface and Tshark.|
Wireshark command line interface overview.
Wireshark CLI first usage introduction.
T Shark file output.
Tshark timer limits.
Tshark splitting output files.
Difference between display and capture filters in CLI
|Section 6: Network Card Modes: Motioning and Remote Capture.|
Network card modes walk through.
How to enable monitor mode.
Deeper into enabling monitor mode.
Capturing remote traffic.
Decrypting remote wireless traffic.
|Section 7: Tshark Output Formatting.|
Formatting output to a .csv file.
Exporting packet contents.
|Section 8: Wireshark and Nmap Interaction.|
Wireshark and Nmap interaction introduction.
Deeper into the Wireshark and Nmap interaction.
|Section 9: Tunneling Wireshark Traffic Online.|
SSH tunneling to Wireshark introduction.
SSH tunneling to Wireshark second steps.
More about SSH tunneling to Wireshark.
Finishing SSH tunneling to Wireshark.
|Section 10: Traffic monitoring on a proxy server, log file overview + wireshark live capture|
Proxy server traffic monitoring part 1
Proxy server traffic monitoring part 2
Proxy server traffic monitoring part 3
Proxy server traffic monitoring part 4
Proxy server traffic monitoring part 5
Proxy server traffic monitoring part 6
|Section 11: Bonus lectures.|
Bonus lecture: Get any additional course with us for 50% off here!
Strongly motivated young IT expert, Linux enthusiast with a passion for troubleshooting network related problems. With an exceptional eye for details and a sense of urgency when it comes down to problem solving.
- Advanced knowledge of Linux command line
- Installation, configuration and maintenance of servers that run under Unix/Linux type
To name a few: DNS, TFTP, FTP, SSH, APACHE, SMTP, VSFTP and some others
- Troubleshooting a wide range of network related problems. Meaning, digging deep for
packets on any given network.
Using one of my favourite tools for capturing and filtering packets on the network, Wireshark,
and resolving end-user issues
- Good understanding of Cisco routers and IOS operating system
- Configuration and implementation of Linux firewall namely Iptables
- Supervision and filtration of network traffic
- Tightening down security and pen testing networks for possible vulnerabilities
- Good knowledge of network gear brands and their strengths or weaknesses
- Preforming system back up
- Fair knowledge of Bash scripting
- equipment installation, upgrades, patches, and configuration.
I do not sleep much, but that is not only because I work hard, rather instead it is
because I enjoy this line of work,
it is extremely rewarding in every way that matters