Discover Network Attacks and Cyber Threats with Wireshark

Paths

Discover Network Attacks and Cyber Threats with Wireshark

Author: Christopher Greer

This skill path will enable security professionals to configure and utilize Wireshark for network forensics and traffic analysis to help detect malicious behavior and threats.

What you will learn:

  • How to properly configure Wireshark for network forensic analysis
  • How Wireshark can detect common network attacks utilizing protocol diagnosis and traffic behavior
  • Utilize Wireshark for mitigating attacks and advanced network analysis

Pre-requisites

Prerequisites for this path include a common knowledge of computer network infrastructure and basic-to-intermediate usage of Wireshark or other packet traffic analyzers.

Discover Network Attacks and Cyber Threats with Wireshark

The courses in this path will teach how configure and utilize Wireshark for network forensics and traffic analysis to help detect malicious behavior and threats.

Wireshark Configuration for Cyber Security Analysis

by Christopher Greer

Aug 19, 2021 / 1h 28m

1h 28m

Start Course
Description

Properly configuring Wireshark can greatly help to track down IoCs and can reduce the time required for Cyber Security professionals to perform network forensics. In this course, Wireshark Configuration for Cyber Security Analysis, you’ll learn to quickly spot suspect traffic with Wireshark. First, you’ll explore the top five Wireshark settings that all Security Professionals should implement when analyzing traffic. Next, you’ll discover how to create filters and coloring rules that will make suspect traffic stand out. Finally, you’ll learn how to decrypt TLS traffic for analyzing secure communications. When you’re finished with this course, you’ll have the skills and knowledge of Wireshark needed to speed up traffic analysis and incident response.

Table of contents
  1. Course Overview
  2. Top Five Wireshark Features for Forensic Analysis
  3. Filters and Coloring Rules for Spotting Suspect Traffic
  4. Configuring Wireshark for Decrypting Traffic

Coming Soon

Identify Common Cyber Network Attacks with Wireshark

Coming Soon

by Christopher Greer