The Complete Wireshark Course: Go from Beginner to Advanced!
4.2 (826 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
31,486 students enrolled
Wishlisted Wishlist

Please confirm that you want to add The Complete Wireshark Course: Go from Beginner to Advanced! to your Wishlist.

Add to Wishlist

The Complete Wireshark Course: Go from Beginner to Advanced!

Learn to use Wireshark as a networking professional including troubleshooting, analysis, and protocol development!
4.2 (826 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
31,486 students enrolled
Created by Ermin Kreponic
Last updated 4/2016
Learn Fest Sale
Current price: $10 Original price: $195 Discount: 95% off
11 hours left at this price!
30-Day Money-Back Guarantee
  • 6.5 hours on-demand video
  • 2 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Use wireshark as an advanced user.
  • Apply successfully for network admin jobs.
  • Work as a freelancer using wireshark skills learned in this course.
  • See how to add a wireshark certificate to your LinkedIn profile!
View Curriculum
  • Have a computer capable of running wireshark.
  • Consistent experience with accessing the internet and working online.

Wireshark is much easier to learn when you take this course and try everything you see for yourself! Wireshark is a free open-source packet analyzer that is the number one tool for network analysis, troubleshooting, software and communications protocol development, and related education in networking. Knowing Wireshark gives you the ability to successfully apply for network administrator jobs and easily earn money as a freelancer online because Wireshark is an in demand skill!

Use this course to speed up your learning with Wireshark with hands on tutorials showing you exactly what you can do in Wireshark founded on explanations of basic network terminology, installing Wireshark, and a review of the basic functions. The course begins with the basics and continues to dive deeper allowing you to follow along and try everything you see for yourself!

You should act on your feelings of love, hope, and faith to take this course now if you want to learn a valuable skill to use in your own company or to make money as a freelancer or employee working in a network administration job!

Who is the target audience?
  • Network administrators looking to build deeper knowledge of wireshark.
  • Entrepreneurs desiring to learn more about network protocols.
  • Freelancers wishing to add an in demand skill to their profile.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 41 Lectures Collapse All 41 Lectures 06:43:19
Welcome to Wireshark! What is it, why should you learn it, and networking basics
5 Lectures 35:15

Introduction to Wireshark and a brief overview of the course, stating what one can learn from it along with giving some general info on the subject of network traffic.

Preview 04:23

Some basic concepts that will come in handy during the course, such as IP addresses, MAC addresses, ports, etc. This tutorial deals with essential terms and concepts needed in order for one to be able to understand the network traffic which will later be captured in Wireshark.

Preview 14:27

Here you can learn the layout of the OSI model and what sort of traffic can be found at each of the seven layers. Very useful to know not only as general knowledge, but rather instead to save one a great deal of time when going through information contained within the packets.

OSI model: What it is, different layers, and why is it important to understand.

How to get a certificate + add Wireshark to your LinkedIn profile certifications

How to get help with questions and solve problems in the course.
1 page
Getting Started with Wireshark. How to set it up, install, and the interface.
3 Lectures 44:41

Here one may see how Wireshark program is installed via Linux terminal. It covers things such as, searching for Wireshark in the repositories, set of terminal commands needed for the installation process and it also deals with possible problems that might occur during the installation.

Wireshark installation and setup (Linux environment).

Introducing a user to Wireshark interface and explaining its various functionalities.

Wireshark interface

Dealing with a wide range of options such as: interface appearance and layout configuration, filter options, capture modes and so forth.

Deeper into the wireshark interface
Key functions for use within wireshark.
4 Lectures 34:35

Dealing with the subject of Wireshark filters, to be more precise this tutorial explain how protocol filters can be applied in order to reduce the amount of redundant packets.

Protocol filters

Introducing IP and port filtering options along with explaining the proper syntax to be used. And demonstrating how the capture process can be manipulated to only provide packets which fit specified ranges of filters.

IP and port filtering

In depth analysis of HTTP packets. Examining the values of various fields of the Wireshark output and looking at the content of an HTTP packet, understanding what sort of information does it contain and what useful things we can extract from it.

HTTP packet analysis

Demonstration of how unencrypted traffic can be potentially dangerous, and what sort of sensitive information can be extracted from it.

Demonstrating how credentials can be stolen over insecure networks.
Firewalls and Unauthorized Traffic with wireshark.
2 Lectures 12:51

Demonstrating how Wireshark can be used to confirm and monitor firewall settings and pointing out the similarities between a firewall in Linux (iptables) and Wireshark in terms of traffic filtering.

Wireshark and Linux firewall interaction

Short exercise to demonstrate how to spot suspicious or unauthorized traffic and how to put an end to it. Deals with subjects such as: spotting suspicious packets, determining their cause and putting a stop to such traffic.

Demonstration of detecting unauthorized traffic
Introduction to Wireshark Command Line Interface and Tshark.
7 Lectures 01:00:50
Wireshark command line interface overview.

Wireshark CLI first usage introduction.

T Shark file output.

Tshark timer limits.

Tshark splitting output files.

Difference between display and capture filters in CLI

Field separation.
Network Card Modes: Motioning and Remote Capture.
5 Lectures 47:56
Network card modes walk through.

How to enable monitor mode.

Deeper into enabling monitor mode.

Capturing remote traffic.

Decrypting remote wireless traffic.
Tshark Output Formatting.
2 Lectures 18:02
Formatting output to a .csv file.

Exporting packet contents.
Wireshark and Nmap Interaction.
2 Lectures 18:35
Wireshark and Nmap interaction introduction.

Deeper into the Wireshark and Nmap interaction.
Tunneling Wireshark Traffic Online.
4 Lectures 31:50
SSH tunneling to Wireshark introduction.

SSH tunneling to Wireshark second steps.

More about SSH tunneling to Wireshark.

Finishing SSH tunneling to Wireshark.
Traffic monitoring on a proxy server, log file overview + wireshark live capture
6 Lectures 01:35:16
Proxy server traffic monitoring part 1

Proxy server traffic monitoring part 2

Proxy server traffic monitoring part 3

Proxy server traffic monitoring part 4

Proxy server traffic monitoring part 5

Proxy server traffic monitoring part 6
1 More Section
About the Instructor
Ermin Kreponic
4.3 Average rating
18,740 Reviews
256,814 Students
12 Courses

Strongly motivated young IT expert, Linux enthusiast with a passion for troubleshooting network related problems. With an exceptional eye for details and a sense of urgency when it comes down to problem solving.

- Advanced knowledge of Linux command line
- Installation, configuration and maintenance of servers that run under Unix/Linux type
operating systems
To name a few: DNS, TFTP, FTP, SSH, APACHE, SMTP, VSFTP and some others
- Troubleshooting a wide range of network related problems. Meaning, digging deep for
packets on any given network.
Using one of my favourite tools for capturing and filtering packets on the network, Wireshark,
and resolving end-user issues
- Good understanding of Cisco routers and IOS operating system
- Configuration and implementation of Linux firewall namely Iptables
- Supervision and filtration of network traffic
- Tightening down security and pen testing networks for possible vulnerabilities
- Good knowledge of network gear brands and their strengths or weaknesses
- Preforming system back up
- Fair knowledge of Bash scripting
- equipment installation, upgrades, patches, and configuration.

Personal note:

I do not sleep much, but that is not only because I work hard, rather instead it is
because I enjoy this line of work,
it is extremely rewarding in every way that matters