Wireshark is a network packet analysis tool that enables you to see the traffic going over the network. At the end of 2015, Wireshark 2.0 was released. This release radically changed the GUI, and added several major improvements. This course is based on this new version of Wireshark. It is recommended that you take the Wireshark 2.0 Fundamentals as a prerequisite to this course. In Wireshark Core Protocol Analysis, you will look at the key TCP/IP protocols used in today's enterprise networks. First, you'll learn about the four-step methodology for analyzing any network protocol. Next, you'll explore the eight most core protocols that are on today's enterprise networks. Finally, you'll wrap up the course by understanding key security protocols running on your network, and learn how to get yourself ready to support IoT on your enterprise network. By the end this course, you will have reinforced your understanding of how these eight core protocols work, be familiar with the key fields carried in the protocol header, and most importantly, you'll know what to look for when analyzing your enterprise (or even your home) network.
Course Overview Hi everyone, my name is Dr. Avril Salter, and welcome to my course, Wireshark Core Protocol Analysis. I'm an independent consultant at Salter & Associates, and I've been working on network traffic analysis for so many years that I don't want to tell you how long because it ages me so much. This course is focused on how to analyze the core protocols that are used in your enterprise network. There are two dominate reasons why I think you should be considering taking this course. Firstly, Wireshark is the de facto standard today for performing network analysis. It's therefore highly valued and recognized by enterprises as an essential skillset for those people that are working on enterprise networks. Secondly, it is increasingly important to know what traffic is going over your network, whether in the enterprise environment or on your home personal network. In this course, we're going to take you through how to look at the key protocols that are used in today's enterprise networks. These protocols include Ethernet, Spanning Tree Protocol, ARP, the 802. 1Q tagging that's used for tagging traffic onto different VLANs, ICMP, we're also going to look at Wi-Fi, and of course we will look at IP and TCP. Some of the major topics that we will cover in this course will be a four-step methodology that I've personally had great success in using when analyzing any network protocol. And then I have a module on each of those TCP protocols that I mentioned earlier that are the core protocols that are used in today's enterprise networks. Once you finish this course, my hope is that first it has reinforced your understanding on how these eight core protocols work. You should be familiar with the key fields that are carried in the protocol header, and the implications of different values in those key fields. And what's most important is that you should've gained a good understanding of some of the most important things to look for when you're analyzing these different protocols in your enterprise network, and again some of these protocols apply to your home network as well. Before beginning the course, it is desirable that you're familiar with basic networking concepts. For example, the OSI model, and how network addressing is done. I hope you'll join me on this journey to learn how to analyze traffic in your enterprise network with the Wireshark Core Protocol Analysis course here at Pluralsight.