Network Protocol Analysis Using Wireshark Part-2

Description

If you did plan to start your career in Information Security, Network Protocol Analysis is a crucial skill that has to be acquired. In this course, we will cover the following,

  • Built display filter expressions, this helps us to filter packets of our interest. This portion helps you to familiarize yourself with Wireshark’s Display filter language.
  • In the TCP based protocols, we can see the data from the TCP stream. In this course, you will learn to follow a TCP stream, reconstruct a TCP Stream, and recover an unsecured username and password from Trace.
  • While investigating any suspicious activity, it is very important to export objects from a PCAP file. This course covers exporting objects from HTTP traffic and reconstruct the browsed images.
  • ¬∑You might have to create a profile in Wireshark, which helps us in saving significant time to audit/troubleshoot the network.
  • TCP three-way Handshake Analysis helps you to identify and analyze the initial three-way handshake.
  • Decoding the ICMP packet to understand the Double Deaded ICMP Packet Analysis.
  • Create an I/O graph to plot the packet data and protocols in visual representation.
  • A conversation is a traffic between two IP addresses. We cover to extract and Save a single subnet conversation.
  • Understanding the Zero Window Condition and Windows Update process.

Who this course is for:

  • Computer Forensics/Digital Forensics Professionals
  • Incident Response Personnel
  • Information Security Professionals
  • IT Managers
  • Law Enforcement Personnel
  • Legal Professionals
  • Network Administrators and Architects
  • System Administrators

Requirements

  • Basic knowledge of Networking
  • Understanding TCP/IP fundamentals.
  • A computer with Internet connection

Last Updated 3/2021

Download Links

Direct Download

Network Protocol Analysis Using Wireshark Part-2.zip (1.9 GB) | Mirror

Torrent Download

Network Protocol Analysis Using Wireshark Part-2.torrent (89 KB) | Mirror

Source: https://www.udemy.com/course/network-protocol-analysis-using-wireshark-part-2/

2 thoughts on “Network Protocol Analysis Using Wireshark Part-2

Leave a Reply

Your email address will not be published. Required fields are marked *