Discover Network Attacks and Cyber Threats with Wireshark

Paths

Discover Network Attacks and Cyber Threats with Wireshark

Author: Chris Greer

This skill path will enable security professionals to configure and utilize Wireshark for network forensics and traffic analysis to help detect malicious behavior and threats.

What you will learn:

  • How to properly configure Wireshark for network forensic analysis
  • How Wireshark can detect common network attacks utilizing protocol diagnosis and traffic behavior
  • Utilize Wireshark for mitigating attacks and advanced network analysis

Pre-requisites

Prerequisites for this path include a common knowledge of computer network infrastructure and basic-to-intermediate usage of Wireshark or other packet traffic analyzers.

Discover Network Attacks and Cyber Threats with Wireshark

The courses in this path will teach how configure and utilize Wireshark for network forensics and traffic analysis to help detect malicious behavior and threats.

Wireshark Configuration for Cyber Security Analysis

by Chris Greer

Aug 19, 2021 / 1h 28m

1h 28m

Start Course
Description

Properly configuring Wireshark can greatly help to track down IoCs and can reduce the time required for Cyber Security professionals to perform network forensics. In this course, Wireshark Configuration for Cyber Security Analysis, you’ll learn to quickly spot suspect traffic with Wireshark. First, you’ll explore the top five Wireshark settings that all Security Professionals should implement when analyzing traffic. Next, you’ll discover how to create filters and coloring rules that will make suspect traffic stand out. Finally, you’ll learn how to decrypt TLS traffic for analyzing secure communications. When you’re finished with this course, you’ll have the skills and knowledge of Wireshark needed to speed up traffic analysis and incident response.

Table of contents
  1. Course Overview
  2. Top Five Wireshark Features for Forensic Analysis
  3. Filters and Coloring Rules for Spotting Suspect Traffic
  4. Configuring Wireshark for Decrypting Traffic

Identify Common Cyber Network Attacks with Wireshark

by Chris Greer

Oct 12, 2021 / 2h 34m

2h 34m

Start Course
Description

Cyber attacks are everywhere. Are they lurking in your network? Every IT professional needs to develop the skills with Wireshark to quickly spot them. In this course, Identify Common Cyber Network Attacks with Wireshark, you’ll gain the ability to threat hunt at the packet level. First, you’ll explore how network and OS Fingerprinting scans work and how to identify them. Next, you’ll discover how to spot indicators of compromise in malware infections. Finally, you’ll learn how to isolate botnet and data exfiltration traffic. When you’re finished with this course, you’ll have the skills and knowledge of threat hunting with Wireshark needed to identify common cyber network attacks on your network.

Table of contents
  1. Course Overview
  2. When to Break Out Wireshark for Threat Hunting
  3. Analyzing Port Scans and Enumeration Methods
  4. Analyzing Common Attack Signatures of Suspect Traffic
  5. Identifying Common Malware Behavior
  6. Identify Shell, Reverse Shell, Botnet, and DDoS Attack Traffic
Learning Paths

Discover Network Attacks and Cyber Threats with Wireshark

  • Number of Courses2 courses
  • Duration4 hours

This skill path will enable security professionals to configure and utilize Wireshark for network forensics and traffic analysis to help detect malicious behavior and threats.

Courses in this path

Discover Network Attacks and Cyber Threats with Wireshark

The courses in this path will teach how configure and utilize Wireshark for network forensics and traffic analysis to help detect malicious behavior and threats.

Join our learners and upskill
in leading technologies