Analyzing and Defending Networks with Wireshark

This course provides students a complete foundational understanding of the process for conducting network protocol analysis, an essential skill required for a number of high value careers in the cybersecurity field.

Kevin Cardwell
Published: Mar 2021
Core
Cybersecurity
3 hours 30 minutes
Analyzing and Defending Networks with Wireshark

Course Overview

Analyzing and Defending Networks with Wireshark This course provides students a complete foundational understanding of the process for conducting network protocol analysis, an essential skill required for a number of high value careers in the cybersecurity field. Protocol analysis is the technique of analyzing what is or has taken place on a network and is used by Security Operations Center analysts, as well as others including network forensics investigators. In this course, we take static capture files that you will be provided and show you how to analyze each with the Wireshark tool. You will learn ways to quickly identify anything that is abnormal within a network packet capture. This will provide you with the initial skills for intrusion analysis, and also malware tracking and monitoring.

Skills You Will Gain

Hacking
TCP/IP
Wireshark

Course Includes

3.2K
STUDENTS*
94.8%
RECOMMEND*

This course includes:

  • 3+ hours of on-demand video
  • 10 modules
  • Core level
  • Direct access/chat with the instructor
  • 100% self-paced online
  • Many downloadable resources
  • Shareable certificate of completion

Learning Outcomes (At the end of this program, you will be able to...)

  • Get to know the key features of Wireshark
  • Recognize the essential components of network communication
  • Explore the different methods of setting up a packet capture
  • Analyze packets using the Wireshark tool
  • Analyze client to server communication with Wireshark
  • Examine network traffic and identify potentially malicious traffic
  • Examine the data within the network and how it shows up in Wireshark

Prerequisites

  • Basic understanding of the command line
  • General knowledge of what an IP address is and TCP/IP
  • Basic understanding of 7 layers of OSI model

Who Should Attend

  • This course is for beginners or people interested in learning about hacking and don’t know where to start.

Curriculum

Explore the comprehensive, hands-on curriculum designed to build your expertise step by step.

Meet Your Expert Instructors

Frequently Asked Questions

How much do the courses at Starweaver cost?

We offer flexible payment options to make learning accessible for everyone. With our Pay-As-You-Go plan, you can pay for each course individually. Alternatively, our Subscription-Based plan provides you with unlimited access to all courses for a monthly or yearly fee.

Do you offer any certifications upon completion of a course at Starweaver?

Yes, we do offer a certification upon completion of our course to showcase your newly acquired skills and expertise.

Does Starweaver offer any free courses or trials?

No, we don't offer any free courses, but we do offer 5-day trial only on our subscriptions-based plans.

Are Starweaver's courses designed for beginners or advanced students?

Our course is designed with three levels to cater to your learning needs - Core, Intermediate, and Advanced. You can choose the level that best suits your knowledge and skillset to enhance your learning experience.

What payment options are available for Starweaver courses?

We accept various payment methods such as major credit cards, PayPal, wire transfer, and company purchase orders. For more information related to payments contact customer support.

Do you offer refunds?

Yes, we do offer a 100% refund guarantee for our courses within a specified time frame. If you are not satisfied with the course, contact our customer support team to request a refund with your order details. Some restrictions may apply.

*Where courses have been offered multiple times, the “# Students” includes all students who have enrolled. The “%Recommended” shown is also based on this data.