Master the art of network security with our Wireshark course, designed for aspiring network security professionals looking to excel in analyzing and troubleshooting today's complex security protocols.
Capture and analyze network traffic.
Identify and understand network security protocols and mechanisms.
Develop Wireshark profiles, filters, and coloring rules for analysis.
Use Wireshark's statistical and decryption tools effectively.
Industry expert Dr. Avril Salter teaches this 4-day instructor-led Wireshark Training course. You’ll learn how to use Wireshark to understand common network security protocols that are deployed in IP networks today, including:
No upcoming dates. Please check back later.
The ethics of capturing wireless traffic
Understanding what Wireshark does and doesn’t do
Installing Wireshark and doing a live capture
Exporting and saving packet captures
Cryptography
A close look at Telnet
Labs: Telnet
Part 1: Live packet capture and timestamps
Part 2: Export package and Telnet port numbers
Part 3: Changing columns and Telnet authentication
Leveraging Wireshark’s packet search capabilities
Using capture filters
Analyzing traffic with display filters
Public and private cryptography
Hashing algorithms
A close look at SSH
Labs: SSH
Part 1: Display filters and SSH service requests
Part 2: Expressions and SSH performance
Part 3: Filtering TCP conversations
Creating coloring rules to identify key security issues
Diffie-Hellman key agreement protocol
Shared secret
Digital certificates
A close look at SLS/TLS
Labs: TLS
Part 1: Coloring rules and TLS versions
Part 2: Colorizing packets and TLS 1.2 security attributes
Part 3: Compare and contrast TLS 1.2 and TLS 1.3
Part 4: TLS 1.3 0-RTT
Defining your preferences
Creating configuration profiles
Random nonces
Security Association (SA)
A close look at IKE
Labs: IKE
Part 1: Configuration profiles and ISAKMP
Part 2: Establishing and IKE security association
Leveraging Wireshark statistics in analyzing network traffic
Authentication, encryption and message integrity
Decryption traffic in Wireshark
A close look at AH
A close look at ESP
Labs: IPsec
Part 1: Statistics and IPSEC AH
Part 2: Decryption and IPSEC ESP
Merging packet captures
Authentication protocols
A close look at IEEE 802.1X
Analyzing RADIUS messages
A close look at EAP and EAP Authentication methods
Analyzing EAPoL messages
Wi-Fi Protected Access (WPA)
Labs: 802.1X
Part 1: 802.1X USING PEAP AND RADIUS
Part 2: EAPOL and the 4-Way Handshake
WPA2-Enterprise authentication
A look at Layer 2 Tunneling Protocol (L2TP)
A look at the new QUIC protocol
Labs: Supplemental labs
Layer 2 Tunneling Protocol (L2TP)
Quick UDP Internet Connections (QUIC)
Your team deserves training as unique as they are.
Let us tailor the course to your needs at no extra cost.
Trusted by Engineers at:
and more...
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier