Wireshark is an open-source network protocol analyzer. It is the world's leading packet analyzer when it comes to analysis, troubleshooting, development, and other security-related tasks.
Wireshark 3 comes with interesting features designed to make things easier and smoother for developers, sysadmins, and security analysts. This practical and hands-on course will be your perfect guide and will help you gain real-world practical knowledge about network analysis with Wireshark 3.
You will begin with a quick introduction to Wireshark, network protocols, and OSI layers. Then learn to understand how Wireshark works and its important functionalities. You will master dedicated Wireshark tools such as capture tools, tracing tools, traffic generators, and more. Then become familiar with the new features that Wireshark 3 has to offer, how they differ from previous ones, and how they can benefit you as a user.
In a step-by-step manner you'll learn how to analyze your network, through clear examples and hands-on activities. Specifically, you will learn how to analyze data, identify glitches, capture web traffic, and will cover topics such as packet analysis, IP filtering, and protocol filters.
You will also learn how to secure your network with Wireshark 3 and how to use its command-line tools effectively. Finally, cover techniques that will help you troubleshoot your communications network.
By the end of the course, you will feel confident about using Wireshark 3 for your day-to-day network analysis tasks.
What You Will Learn
- Troubleshoot your networks using Wireshark 3
- Capture many famous protocols with Wireshark 3
- How to use Wireshark 3 for ethical hacking
- Understand and interpret network protocols
This course is for developers, sysadmins, and security analysts/experts who want to use Wireshark 3 to analyze their network while performing day-to-day tasks in their organization.
No prior knowledge of Wireshark is required. However, those who are already familiar with previous versions of Wireshark and want to update their skills will also benefit from this course.
About The Author
Mohammad Mahjoub: Mohamad Mahjoub is a prolific writer and a Cyber Security Expert with over 15 years' experience, including more than 5 years working with Wireshark. He is a licensed and certified CISSP, ISO Risk Manager, CISA, PMP, and ITIL.
He obtained his Master's Degree in Computer Science from the Lebanese American University, where he graduated magna cum laude.
Mohamad's accomplishments and research acumen drive him and are rooted in his professionalism. He is qualified to offer first-hand professional cyber security services to individuals and companies. Since 2012, Mohamad has delivered many IT courses to fresh graduates, IT professionals, senior and executive management, and business owners, all on top of his online multilingual cyber security courses with more than 30,000 students enrolled worldwide.
Currently, Mohamad works as CISO for a French multinational company, where he is responsible for the security of IT and OT operations throughout the Middle East.
Table of contents
- Chapter 1 : Introduction and Setting Up Your Environment
- Chapter 2 : Exploring the Wireshark 3 Interface
- Chapter 3 : Traffic Capturing and Filtering
- Chapter 4 : Network Communication Techniques
- Chapter 5 : Exploring Communication Protocols
- Chapter 6 : Analyzing Common Protocols
- Title: Network Analysis Using Wireshark 3
- Release date: April 2020
- Publisher(s): Packt Publishing
- ISBN: 9781838825164
You might also like
Network Analysis Using Wireshark Cookbook
This book will be a massive ally in troubleshooting your network using Wireshark, the world’s most …
Network Analysis Using Wireshark 2 Cookbook - Second Edition
Over 100 recipes to analyze and troubleshoot network problems using Wireshark 2 About This Book Place …
Packet Analysis with Wireshark
Leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques …
Hands-On Network Scanning with Nmap for Network Security
Do you want to enhance your organization’s network security? Are you worried about what could happen …