Wireshark Core Protocol Analysis

This course will enable you to use Wireshark to understand and analyze the network traffic going over your enterprise network.
Course info
Rating
(18)
Level
Beginner
Updated
Oct 24, 2016
Duration
4h 19m
Table of contents
Course Overview
Doing Packet Analysis with Wireshark
802.3: Look at the Ethernet Protocol to Check Your Links
802.1Q: Check Your VLANs to Make Sure They Are Tagged Correctly
Spanning Tree Protocol: Make Sure There Are No Loops in Your LAN
ARP: Using Address Resolution When Your Ping Test Fails
802.11: See What Traffic Is Going Over Your Wi-Fi Networks
IPv4: Are Your IP Packets Fragmenting?
ICMP: Use ICMP Messages to Detect Network Problems
TCP: What Every IT Professional Should Know
Course Wrap-up
Description
Course info
Rating
(18)
Level
Beginner
Updated
Oct 24, 2016
Duration
4h 19m
Description

Wireshark is a network packet analysis tool that enables you to see the traffic going over the network. At the end of 2015, Wireshark 2.0 was released. This release radically changed the GUI, and added several major improvements. This course is based on this new version of Wireshark. It is recommended that you take the Wireshark 2.0 Fundamentals as a prerequisite to this course. In Wireshark Core Protocol Analysis, you will look at the key TCP/IP protocols used in today's enterprise networks. First, you'll learn about the four-step methodology for analyzing any network protocol. Next, you'll explore the eight most core protocols that are on today's enterprise networks. Finally, you'll wrap up the course by understanding key security protocols running on your network, and learn how to get yourself ready to support IoT on your enterprise network. By the end this course, you will have reinforced your understanding of how these eight core protocols work, be familiar with the key fields carried in the protocol header, and most importantly, you'll know what to look for when analyzing your enterprise (or even your home) network.

About the author
About the author

Dr. Salter is a consultant, writer and technical trainer with over 20 years of industry experience in deploying networks and managing IT operations.

More from the author
Wireshark 2.0: Fundamentals
Beginner
4h 10m
Jul 5, 2016
More courses by Avril Salter
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone, my name is Dr. Avril Salter, and welcome to my course, Wireshark Core Protocol Analysis. I'm an independent consultant at Salter & Associates, and I've been working on network traffic analysis for so many years that I don't want to tell you how long because it ages me so much. This course is focused on how to analyze the core protocols that are used in your enterprise network. There are two dominate reasons why I think you should be considering taking this course. Firstly, Wireshark is the de facto standard today for performing network analysis. It's therefore highly valued and recognized by enterprises as an essential skillset for those people that are working on enterprise networks. Secondly, it is increasingly important to know what traffic is going over your network, whether in the enterprise environment or on your home personal network. In this course, we're going to take you through how to look at the key protocols that are used in today's enterprise networks. These protocols include Ethernet, Spanning Tree Protocol, ARP, the 802. 1Q tagging that's used for tagging traffic onto different VLANs, ICMP, we're also going to look at Wi-Fi, and of course we will look at IP and TCP. Some of the major topics that we will cover in this course will be a four-step methodology that I've personally had great success in using when analyzing any network protocol. And then I have a module on each of those TCP protocols that I mentioned earlier that are the core protocols that are used in today's enterprise networks. Once you finish this course, my hope is that first it has reinforced your understanding on how these eight core protocols work. You should be familiar with the key fields that are carried in the protocol header, and the implications of different values in those key fields. And what's most important is that you should've gained a good understanding of some of the most important things to look for when you're analyzing these different protocols in your enterprise network, and again some of these protocols apply to your home network as well. Before beginning the course, it is desirable that you're familiar with basic networking concepts. For example, the OSI model, and how network addressing is done. I hope you'll join me on this journey to learn how to analyze traffic in your enterprise network with the Wireshark Core Protocol Analysis course here at Pluralsight.