The Complete Wireshark Course: Go from Beginner to Advanced!

Learn to use Wireshark as a networking professional including troubleshooting, analysis, and protocol development!
4.2 (573 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
20,578 students enrolled
92% off
Take This Course
  • Lectures 41
  • Length 6.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works


Find online courses made by experts from around the world.


Take your courses with you and learn anywhere, anytime.


Learn and practice real-world skills and achieve your goals.

About This Course

Published 2/2015 English

Course Description

Wireshark is much easier to learn when you take this course and try everything you see for yourself! Wireshark is a free open-source packet analyzer that is the number one tool for network analysis, troubleshooting, software and communications protocol development, and related education in networking. Knowing Wireshark gives you the ability to successfully apply for network administrator jobs and easily earn money as a freelancer online because Wireshark is an in demand skill!

Use this course to speed up your learning with Wireshark with hands on tutorials showing you exactly what you can do in Wireshark founded on explanations of basic network terminology, installing Wireshark, and a review of the basic functions. The course begins with the basics and continues to dive deeper allowing you to follow along and try everything you see for yourself!

You should act on your feelings of love, hope, and faith to take this course now if you want to learn a valuable skill to use in your own company or to make money as a freelancer or employee working in a network administration job!

What are the requirements?

  • Have a computer capable of running wireshark.
  • Consistent experience with accessing the internet and working online.

What am I going to get from this course?

  • Use wireshark as an advanced user.
  • Apply successfully for network admin jobs.
  • Work as a freelancer using wireshark skills learned in this course.
  • See how to add a wireshark certificate to your LinkedIn profile!

Who is the target audience?

  • Network administrators looking to build deeper knowledge of wireshark.
  • Entrepreneurs desiring to learn more about network protocols.
  • Freelancers wishing to add an in demand skill to their profile.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.


Section 1: Welcome to Wireshark! What is it, why should you learn it, and networking basics

Introduction to Wireshark and a brief overview of the course, stating what one can learn from it along with giving some general info on the subject of network traffic.


Some basic concepts that will come in handy during the course, such as IP addresses, MAC addresses, ports, etc. This tutorial deals with essential terms and concepts needed in order for one to be able to understand the network traffic which will later be captured in Wireshark.


Here you can learn the layout of the OSI model and what sort of traffic can be found at each of the seven layers. Very useful to know not only as general knowledge, but rather instead to save one a great deal of time when going through information contained within the packets.

How to get a certificate + add Wireshark to your LinkedIn profile certifications
How to get help with questions and solve problems in the course.
1 page
Section 2: Getting Started with Wireshark. How to set it up, install, and the interface.

Here one may see how Wireshark program is installed via Linux terminal. It covers things such as, searching for Wireshark in the repositories, set of terminal commands needed for the installation process and it also deals with possible problems that might occur during the installation.


Introducing a user to Wireshark interface and explaining its various functionalities.


Dealing with a wide range of options such as: interface appearance and layout configuration, filter options, capture modes and so forth.

Section 3: Key functions for use within wireshark.

Dealing with the subject of Wireshark filters, to be more precise this tutorial explain how protocol filters can be applied in order to reduce the amount of redundant packets.


Introducing IP and port filtering options along with explaining the proper syntax to be used. And demonstrating how the capture process can be manipulated to only provide packets which fit specified ranges of filters.


In depth analysis of HTTP packets. Examining the values of various fields of the Wireshark output and looking at the content of an HTTP packet, understanding what sort of information does it contain and what useful things we can extract from it.


Demonstration of how unencrypted traffic can be potentially dangerous, and what sort of sensitive information can be extracted from it.

Section 4: Firewalls and Unauthorized Traffic with wireshark.

Demonstrating how Wireshark can be used to confirm and monitor firewall settings and pointing out the similarities between a firewall in Linux (iptables) and Wireshark in terms of traffic filtering.


Short exercise to demonstrate how to spot suspicious or unauthorized traffic and how to put an end to it. Deals with subjects such as: spotting suspicious packets, determining their cause and putting a stop to such traffic.

Section 5: Introduction to Wireshark Command Line Interface and Tshark.
Wireshark command line interface overview.
Wireshark CLI first usage introduction.
T Shark file output.
Tshark timer limits.
Tshark splitting output files.
Difference between display and capture filters in CLI
Field separation.
Section 6: Network Card Modes: Motioning and Remote Capture.
Network card modes walk through.
How to enable monitor mode.
Deeper into enabling monitor mode.
Capturing remote traffic.
Decrypting remote wireless traffic.
Section 7: Tshark Output Formatting.
Formatting output to a .csv file.
Exporting packet contents.
Section 8: Wireshark and Nmap Interaction.
Wireshark and Nmap interaction introduction.
Deeper into the Wireshark and Nmap interaction.
Section 9: Tunneling Wireshark Traffic Online.
SSH tunneling to Wireshark introduction.
SSH tunneling to Wireshark second steps.
More about SSH tunneling to Wireshark.
Finishing SSH tunneling to Wireshark.
Section 10: Traffic monitoring on a proxy server, log file overview + wireshark live capture
Proxy server traffic monitoring part 1
Proxy server traffic monitoring part 2
Proxy server traffic monitoring part 3
Proxy server traffic monitoring part 4
Proxy server traffic monitoring part 5
Proxy server traffic monitoring part 6
Section 11: Bonus lectures.
Bonus lecture: Get any additional course with us for 50% off here!

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Ermin Kreponic, IT Expert

Strongly motivated young IT expert, Linux enthusiast with a passion for troubleshooting network related problems. With an exceptional eye for details and a sense of urgency when it comes down to problem solving.

- Advanced knowledge of Linux command line
- Installation, configuration and maintenance of servers that run under Unix/Linux type
operating systems
To name a few: DNS, TFTP, FTP, SSH, APACHE, SMTP, VSFTP and some others
- Troubleshooting a wide range of network related problems. Meaning, digging deep for
packets on any given network.
Using one of my favourite tools for capturing and filtering packets on the network, Wireshark,
and resolving end-user issues
- Good understanding of Cisco routers and IOS operating system
- Configuration and implementation of Linux firewall namely Iptables
- Supervision and filtration of network traffic
- Tightening down security and pen testing networks for possible vulnerabilities
- Good knowledge of network gear brands and their strengths or weaknesses
- Preforming system back up
- Fair knowledge of Bash scripting
- equipment installation, upgrades, patches, and configuration.

Personal note:

I do not sleep much, but that is not only because I work hard, rather instead it is
because I enjoy this line of work,
it is extremely rewarding in every way that matters

Ready to start learning?
Take This Course