Learning Path: Wireshark 2 - The Advanced Network Analysis Tool
Course
Online
Description
-
Type
Course
-
Methodology
Online
-
Start date
Different dates available
Analyze your organization’s traffic with ease by using one of the most popular and powerful network analyzer.Yes, we do agree network analysis might seem very daunting. But thanks to Wireshark 2, it’s no longer a challenge. The improved GUI, the color coding, the human-readable output are only a few of the many features that make Wireshark a popular choice among its contenders.This Learning Path will introduce you to the basic features of Wireshark 2 and teach you how to leverage these features in the optimal way to organize network traffic. Yes, this is not a course, it’s a Learning Path.Packt’s Video Learning Paths are an amalgamation of multiple video courses that are logically tied together to provide you with a larger learning curve. This Learning Path will brush through the basic networking concepts, and then introduce you to the user interface of Wireshark. Later it moves on to the different ways to create and use the capture and display filters in Wireshark. Also, you’ll be mastering its features, analyzing different layers of the network protocol, and looking for any anomalies.By the end of this Learning Path, you will be able to use Wireshark for network security analysis and configure it for troubleshooting purposes.About the authors:For this Learning Path, we have combined the best works of extremely esteemed authors: Alex Kuzmenko and Andrew Crouthamel. Alex has more than 16 years of engineering hands-on experience in Telecom field. He used Wireshark for mobile network integration, testing, and troubleshooting for more than 5 years in his job in Ericsson, North America. He also had 6 years of technical training experience preparing and conducting courses related to mobile packet networks in Europe and Asia.
.
Andrew is an experienced Senior Network Engineer and IT trainer who resides in Doylestown, PA, and currently works with organizations such as NASA, ESA, JAXA, Boeing, and the US Air Force
Facilities
Location
Start date
Start date
About this course
Learn the ways to capture and import information in Wireshark
Customize Wireshark to maximize visibility to major parts of your traces
Identify the common ways of using Wireshark to troubleshoot/track down the source of your network issues
Analyze common network protocols and common network application protocols
Reviews
This centre's achievements
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 6 years
Subjects
- Network Training
- Graphics
- Statistics
- Installation
- Network security
- Protocol
- Network
- Works
- Networks
Course programme
- What is a protocol and where are protocols used nowadays?
- What end user issues might be related to problems with protocols?
- Protocol analyzers as one of the most powerful tools to solve protocol issues
- What is Wireshark and where can it be used?
- Deep-dive into data input as the main basic function of Wireshark and the decoding basic function
- Discuss a few analysis-related possibilities of Wireshark and the purpose of its use
- Downloading Wireshark; parts of the installation (WINPcap and USBPcap)
- Capturing traffic from other network nodes, from one or more interfaces
- Configuring interfaces for further capturing in Wireshark
- Discuss what parts does the Wireshark window consist of
- Explore how to start capturing from one or more interfaces
- Basic actions: Start/stop/restart live capture in Wireshark
- Discussing protocol and protocol stack
- To learn the basics of the seven-protocol-layer OSI abstract model
- To check out an example of a real protocol stack
- Examine how a protocol stack is shown in your Wireshark
- Talk about how to see the details of each protocol in a stack
- Discuss how to match specification with real capture
- Discuss why we need to filter in Wireshark
- Learn the rules of display filtering
- Learn the rules of display filtering
- Understand the convenient possibilities built in Wireshark for Display filtering
- Know the difference between Capture and Display filters in Wireshark
- Know if we have any syntax difference
- See the examples of Capture filters
- Learn the permanent and temporary coloring rules and the relation with the new scrollbar
- Mark your own packets without any rules
- Add an extra column in the packet list pane
- Understand the ways of saving traces
- Tuning—how to save specific packets only
- Learn another way to save—text file
- Why we may need to split/merge files and what it is
- How to split files in Wireshark
- How to merge them back
- Understand what name resolution is
- Levels of name resolution can be used, and how to switch them on/off?
- How to manually preconfigure names for resolution
- Know why to use graphics
- Understand the Flow graph
- Learn the extra useful settings of Flow graph
- Discuss whether we can separate interesting procedures from each other
- Discover any helpful hints about packets within procedure
- Discuss about the need of statistics
- Example of graphical statistics in Wireshark – I/O graph
- Non-graphical statistics, that is, protocol hierarchy
- Conversation statistics
- Packet lengths statistics
- Understand why Wireshark may not decode
- Learn how to fix it
- Discuss what is troubleshooting in general and digital networks
- What steps it consists of
- Understand the cycle approach in troubleshooting
- What to consider as a particular issue
- Types of issues we may have
- Check symptoms in Wireshark
- Why it's important to think about throughput in your network
- What type of issues you may experience regarding throughput
- How Wireshark could help you find throughput-related symptoms
- Discuss What questions may be related to network security
- Find a way to come with message-flow symptoms so Wireshark can help us
- Examples with DDoS attack and unauthorized access
- What is a protocol and where are protocols used nowadays?
- What end user issues might be related to problems with protocols?
- Protocol analyzers as one of the most powerful tools to solve protocol issues
- What is Wireshark and where can it be used?
- Deep-dive into data input as the main basic function of Wireshark and the decoding basic function
- Discuss a few analysis-related possibilities of Wireshark and the purpose of its use
- Downloading Wireshark; parts of the installation (WINPcap and USBPcap)
- Capturing traffic from other network nodes, from one or more interfaces
- Configuring interfaces for further capturing in Wireshark
- Discuss what parts does the Wireshark window consist of
- Explore how to start capturing from one or more interfaces
- Basic actions: Start/stop/restart live capture in Wireshark
- Discussing protocol and protocol stack
- To learn the basics of the seven-protocol-layer OSI abstract model
- To check out an example of a real protocol stack
- Examine how a protocol stack is shown in your Wireshark
- Talk about how to see the details of each protocol in a stack
- Discuss how to match specification with real capture
- Discuss why we need to filter in Wireshark
- Learn the rules of display filtering
- Learn the rules of display filtering
- Understand the convenient possibilities built in Wireshark for Display filtering
- Know the difference between Capture and Display filters in Wireshark
- Know if we have any syntax difference
- See the examples of Capture filters
- Learn the permanent and temporary coloring rules and the relation with the new scrollbar
- Mark your own packets without any rules
- Add an extra column in the packet list pane
- Understand the ways of saving traces
- Tuning—how to save specific packets only
- Learn another way to save—text file
- Why we may need to split/merge files and what it is
- How to split files in Wireshark
- How to merge them back
- Understand what name resolution is
- Levels of name resolution can be used, and how to switch them on/off?
- How to manually preconfigure names for resolution
- Know why to use graphics
- Understand the Flow graph
- Learn the extra useful settings of Flow graph
- Discuss whether we can separate interesting procedures from each other
- Discover any helpful hints about packets within procedure
- Discuss about the need of statistics
- Example of graphical statistics in Wireshark – I/O graph
- Non-graphical statistics, that is, protocol hierarchy
- Conversation statistics
- Packet lengths statistics
- Understand why Wireshark may not decode
- Learn how to fix it
- Discuss what is troubleshooting in general and digital networks
- What steps it consists of
- Understand the cycle approach in troubleshooting
- What to consider as a particular issue
- Types of issues we may have
- Check symptoms in Wireshark
- Why it's important to think about throughput in your network
- What type of issues you may experience regarding throughput
- How Wireshark could help you find throughput-related symptoms
- Discuss What questions may be related to network security
- Find a way to come with message-flow symptoms so Wireshark can help us
- Examples with DDoS attack and unauthorized access
Additional information
Learning Path: Wireshark 2 - The Advanced Network Analysis Tool
