starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
  1. Journeys
  2. >
  3. Foundations of Cybersecurity

Foundations of Cybersecurity

Knowledge of cybersecurity has become a self-evident essential skill for anyone in technology or business today. As a result of the proliferation of cyber-attacks, companies, governments and individuals are suffering increasingly severe damage to their daily lives. In this Journey, your instructors guide you step by step through the key things you need to know about cybersecurity, and provides you the technical skills to become a proficient entry-level "Cybersecurity Warrior."
Kevin Cardwell
Kevin Cardwell
Cloud | core | 13 hours 20 minutes

    Discussions

Overview

1.4KSTUDENTS*
94%RECOMMEND*

This journey includes:

  • 13+ hours of on-demand video
  • 26 modules
  • Core level
  • Direct access/chat with the instructor
  • 100% self-paced online
  • Many downloadable resources
  • Shareable certificate of completion
Knowledge of cybersecurity has become a self-evident essential skill for anyone in technology or business today. As a result of the proliferation of cyber-attacks, companies, governments and individuals are suffering increasingly severe damage to their daily lives.  In this Journey, your instructors guide you step by step through the key things you need to know about cybersecurity, and provides you the technical skills to become a proficient entry-level "Cybersecurity Warrior."

Skills You Will Gain

Cybersecurity
Hacking
Penetration Testing
TCP/IP

Learning Outcomes (At the end of this program you will be able to)

  • Learn the basics of the cybersecurity field 
  • Become familiar with the techniques and motivations of hackers 
  • Discover the different tools used by hackers
  • Understand the Cybersecurity standards and the differences between them 
  • Analyze threats and risks within the context of the cybersecurity landscape
  • Evaluate decision-making outcomes of cybersecurity scenarios
  • Obtain the expertise required to be able to build a career in cybersecurity.
  • Take steps towards creating a cybersecurity culture within an organization.
  • Master the key concepts of TCP/IP
  • Understand routing, how to count in Binary and switching
  • Master the key concepts from the Network+ exam
  • Get to know the key features of Wireshark
  • Explore the different methods of setting up a packet capture
  • Analyze packets using the Wireshark tool
  • Analyze client to server communication with Wireshark
  • Examine network traffic and identify potentially malicious traffic
  • Examine the data within the network and how it shows up in Wireshark
  • Determine the vector to attack a system or network
  • Assess a web application for weak input validation
  • Deploy tactics to evade detection from IDS/IPS
  • Conduct analysis of data and prepare preliminary findings from a penetration test

 

Who Should Attend

  • This course is aimed at all the individuals who want to guide their future professional career in the area of Cybersecurity
  • IT technicians: System engineers, Network engineers, DB Administrators, Software engineers, developers, …  
  • Security engineers who would like to increase their knowledge in standards and laws for example. 
  • You have no experience in Cybersecurity and want to learn the basic.
  • You’re an IT manager wanting to gain a broad understanding of cybersecurity at a decision-making level to assist you in identifying its role within your organization.
  • You’re a system admin wanting an understanding of potential cybersecurity threats and security measures you should take in your rapidly growing organization.
  • Windows IT administrators and sysadmins

Curriculum

Instructors

Frequently Asked Questions

How much do the courses at Starweaver cost?

We offer flexible payment options to make learning accessible for everyone. With our Pay-As-You-Go plan, you can pay for each course individually. Alternatively, our Subscription-Based plan provides you with unlimited access to all courses for a monthly or yearly fee.

Do you offer any certifications upon completion of a course at Starweaver?

Yes, we do offer a certification upon completion of our course to showcase your newly acquired skills and expertise.

Does Starweaver offer any free courses or trials?

No, we don't offer any free courses, but we do offer 5-day trial only on our subscriptions-based plans.

Are Starweaver's courses designed for beginners or advanced students?

Our course is designed with three levels to cater to your learning needs - Core, Intermediate, and Advanced. You can choose the level that best suits your knowledge and skillset to enhance your learning experience.

What payment options are available for Starweaver courses?

We accept various payment methods such as major credit cards, PayPal, wire transfer, and company purchase orders. For more information related to payments contact customer support.

Do you offer refunds?

Yes, we do offer a 100% refund guarantee for our courses within a specified time frame. If you are not satisfied with the course, contact our customer support team to request a refund with your order details. Some restrictions may apply.

*Where courses have been offered multiple times, the “# Students” includes all students who have enrolled. The “%Recommended” shown is also based on this data.
Analyzing and Defending Networks with Wireshark

Analyzing and Defending Networks with Wireshark

Part 1: Analyzing and Defending Networks with Wireshark

This course provides students a complete foundational understanding of the process for conducting network protocol analysis, an essential skill required for a number of high value careers in the cybersecurity field.

1Welcome to the course!
2Module 1 - Course Overview
3Module 2 - Course Setup: First Steps of Protocol Analysis
4Module 3 - Network Communication at the Packet Level
5Module 4 - TCP/IP Foundation
6Module 5 - Starting your first capture
7Module 6 - Working with Capture Files in Wireshark
8Module 7 - Analyzing Packet Captures
9Module 8 - Examining Protocol Communication
10Module 9 - Bonus Capture Files
11Module 10 - The Steps of Professional Hacking
Kevin Cardwell

Kevin Cardwell

Kevin Cardwell is a cybersecurity expert with extensive experience working with banks and financial institutions across the Middle East, Europe, and the UK. A former leader of a U.S. Department of Defense Red Team, he achieved an impressive 100% success rate in system compromise operations, demonstrating unparalleled expertise in identifying and exploiting vulnerabilities.

Kevin has led high-impact consulting projects, including engagements with Petroleum Development Oman and the Central Bank of Oman. His work includes the design and implementation of customized security baselines for high-profile clients such as Oman Airport Management Company (OAMC), ensuring resilient protection for critical infrastructure.

He is the author of several acclaimed cybersecurity courses and publications, including Building Virtual Pentesting Labs for Advanced Penetration Testing and Advanced Penetration Testing for Highly Secured Environments, 2nd Edition. His areas of specialization include advanced penetration testing, network defense, and security architecture.

As President of Cyber2Labs and Lead Consultant at CESI, Kevin continues to shape the cybersecurity landscape, helping organizations build strong digital defenses against emerging threats. He holds certifications such as Certified Advanced Network Defender and Certified Advanced Penetration Tester, underscoring his commitment to excellence in information security.

In addition to his hands-on expertise, Kevin is a passionate educator and instructor, dedicated to equipping learners with the knowledge and practical skills necessary to navigate the complex world of cybersecurity with confidence. He actively promotes cutting-edge cybersecurity practices and is a trusted voice in the field for both professionals and organizations.

VIEW MY CHANNEL

Segment - 15 - Introduction

Segment - 16 - Saving the capture to a file

Segment - 17 - Advanced Capture Methods

Segment - 18 - Advanced Capture Scenario Analysis Methods With Wireshark.

Segment - 05 - Introduction

Segment - 06 - Analyze Client to Server Communication with the Wireshark User Interface.

Segment - 07 - Your first protocols

Segment - 01 - Introduction

About this course: Overview, Learning Outcomes, Who Should Enroll...

Instructor bio - Kevin Cardwell

Segment - 24 - Bonus-File1 capture file

Segment - 25 - Bonus-File1 Solution

Segment - 26 - Bonus File2 capture File

Segment - 27 - Bonus-File2 Solution

Segment - 28 - The first step of professional hacking scanning methodology

Segment - 29 - The second step of the professional hacking methodology

Segment - 30 - The third step of the professional hacking methodology

Segment - 31 - The fourth step of the professional hacking methodology

Segment - 32 - The fifth step of the professional hacking methodology

Segment - 33 - The sixth step of the professional hacking methodology

Segment - 02 - Download and Install Wireshark

Segment - 03 - Work with Wireshark

Segment - 04 - Review the first packet capture in Wireshark

Segment - 12 - Introduction

Segment - 13 - Live capture exercise

Segment - 14 - Analyzing the live capture using Wireshark.

Segment - 08 - Introduction

Segment - 09 - Protocol Analysis at the Network Level using Wireshark

Segment - 10 - Interpreting Connections and Protocols

Segment - 11 - Intermediate Protocol Analysis of static captures using Wireshark.

Segment - 21 - Introduction

Segment - 22 - Attacking the network communication and identifying artifacts with Wireshark

Segment - 23 - Applying your skills to identify potential incidents within Wireshark captures

Segment - 19 - Introduction

Segment - 20 - Creating Wireshark filters