We may earn an affiliate commission when you visit our partners.
Course image
David Bombal

Learn Wireshark practically. Wireshark pcapng files provided so you can practice while you learn. There is so much to learn in this course:

- Capture Telnet

- Replay VoIP conversations.

- Capture routing protocol (OSPF) authentication passwords.

- Troubleshoot network issues.

- Free software.

- Free downloadable pcapng files.

- Answer quiz questions.

The course is very practical. You can practice while you learn.

Learn how to analyze and interpret network protocols and leverage Wireshark for what it was originally intended: Deep Packet Inspection and network analysis.

Read more

Learn Wireshark practically. Wireshark pcapng files provided so you can practice while you learn. There is so much to learn in this course:

- Capture Telnet

- Replay VoIP conversations.

- Capture routing protocol (OSPF) authentication passwords.

- Troubleshoot network issues.

- Free software.

- Free downloadable pcapng files.

- Answer quiz questions.

The course is very practical. You can practice while you learn.

Learn how to analyze and interpret network protocols and leverage Wireshark for what it was originally intended: Deep Packet Inspection and network analysis.

I also show you have to hack network protocols using Kali Linux. Hack network protocols like

Updates: Now includes Python scripting to automatically capture packets from the network using tshark. Lean how to automate your captures and learn how to hack the network using Python and Wireshark.

Protocols we capture and discuss in this course include:

- Telnet

- FTP

- TFTP

- HTTP

- VoIP

- OSPF

- EIGRP

- DNS

- ICMP

- DTP

-  VTP

- STP

- DHCP

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Learning objectives

  • Learn how to troubleshoot networks using wireshark.
  • Capture voip, ospf, http, telnet and many other protocols using wireshark.
  • Learn how to use wireshark for ethical hacking.
  • Improve your job prospects by adding wireshark to your resume.
  • Understand and interpret network protocols.
  • Hack network protocols using kali linux

Syllabus

Introduction
Answering your questions
Udemy Tips and Tricks
Wireshark Installation: Windows
Read more
Wireshark Installation: Mac OS
Wireshark Basics
The best way to learn!
Capture frames / packets / segments
Why are no packets captured?
Port SPAN / Mirroring
OSI Model
Make a choice
OSI Model - Part 1 - OSI Model Introduction
OSI Model - Part 2 - OSI Model Layers
OSI Model - Part 3 - Split of concentration
OSI Model - Part 4 - Layer 7 Application Layer
OSI Model - Part 5 - Layer 6 Presentation Layer
OSI Model - Part 6 - Layer 5 Session Layer
OSI Model - Part 7 - Top layers versus lower layers
OSI Model - Part 8 - Transport Layer
OSI Model - Part 9 - Network Layer
OSI Model - Part 10 - Data Link Layer
OSI Model - Part 11 - Physical Layer
OSI Model - Part 12 - Host Communication
OSI Model - Part 13 - Encapsulation
OSI Model - Part 14 - TCPIP versus OSI Model
Wireshark Filters
Wireshark Display filters
Practical Demonstration of Wireshark Display filters
Two types of filters
Wireshark Capture Filters
Wireshark Filters: IP address / protocols
Wireshark: Hacking Passwords
Telnet Password & Data Captures
TFTP Password & Data Capture
FTP Password & Data Capture
HTTP Data Capture
Cisco router HTTP Password Capture
Hacking VoIP
Replay Voice over IP calls (Virtual IP Phones)
Capture and replay voice calls (Virtual & Physical IP Phones)
Protocol Analysis: Can you troubleshoot the network?
DTP Lab: Quiz
DTP Lab: Answers
CDP, LLDP Lab: Quiz
CDP, LLDP Lab: Answers
OSPF Lab: Quiz
OSPF Lab: Answers Part 1
OSPF Lab: Answers Part 2
OSPF Troubleshooting Lab 1: Question
OSPF Troubleshooting Lab 1: Answers
OSPF Troubleshooting Lab 2: Question
OSPF Troubleshooting Lab 2: Answers
OSPF Troubleshooting Lab 3: Question
OSPF Troubleshooting Lab 3: Answers
EIGRP Lab: Questions
EIGRP Lab: Answers
EIGRP Troubleshooting Lab 1: Question
EIGRP Troubleshooting Lab 1: Answers
EIGRP Troubleshooting Lab 2: Question
EIGRP Troubleshooting Lab 2: Answers
BGP Lab: Question
BGP Lab: Answers
BGP Troubleshooting Lab: Question
BGP Troubleshooting Lab: Answers
Wireshark Tips and Tricks
Quick Wireshark Filters
Wireshark Profiles
Wireshark Conversation Filters
Wireshark Statistics
Wireshark Protocol Hierarchy
Wireshark Conversations and IO Graph
Wireshark Flow Graph
tshark and Termshark
Overview and tshark install and packet capture
Termshark
Python Wireshark scripting
tshark and Pyshark installation
Basic Pyshark testing
Pyshark script
Python Wireshark Password Captures
Lab overview and setup
iPython and interactive OSPF script
OSPF Password Python script
FTP Password Capture Python script
Telnet Password Capture Python Script
Kali Linux: Installation
Import Kali Linux (Windows 10 / VirtualBox)
Kali Linux: Network Attack Demonstrations
Network Overview
DTP Attack Demo
VTP Attack Demo Part 1
VTP Attack Demo Part 2
Spanning Tree Attack Demo
Demo: Mitigation of attacks
Kali Linux: DHCP attacks and Man-in-the-middle attack
Overview of lab
DHCP Starvation attack
Rogue DHCP Server; MITM attack, Wireshark password sniffing

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Taught by David Bombal, who is recognized for their work in Wireshark
Provides hands-on labs and interactive materials
Develops professional skills and deep expertise in network analysis
Teaches skills that are highly relevant to industry
Examines network protocols, which is highly relevant to network troubleshooting
Requires learners to come in with extensive background knowledge

Save this course

Save Wireshark: Packet Analysis and Ethical Hacking: Core Skills to your list so you can find it easily later:
Save

Reviews summary

Well-explained packet analysis course

Learners say that this course is well-explained and easy to understand, and that it provides a great foundation for those with some prior networking knowledge. Students also appreciate the real-world examples provided throughout the course.
Students recommend having some prior networking knowledge before taking this course, as it will help you to get the most out of it.
"But I recommend to have some knowledge about Networking etc...to know better of whats going on."
The course is said to provide numerous real-world examples that help students to understand the concepts being taught.
"This (Wireshark) Course is it the very same level! Enjoying this a lot!!! But I recommend to have some knowledge about Networking etc...to know better of whats going on. With Networking experience this Course also shows examples here and there...so the circle closes at the end of what you had difficulties with in CCNA...why and how."
Instructor David Bombal is praised for his clear explanations and engaging teaching style.
"I already take a Course for the CCNA from David Bombal,...and they are very well explained and easy to understand."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Wireshark: Packet Analysis and Ethical Hacking: Core Skills with these activities:
Review OSI Model Concepts
Refresh your understanding of the Open Systems Interconnection (OSI) Model to strengthen your foundation in networking concepts.
Browse courses on OSI Model
Show steps
  • Review notes or online materials on the OSI Model.
  • Create a diagram or mind map to visualize theOSI Model layers and their functionalities.
Python Scripting for Network Packet Analysis
Enhance your Wireshark skills by learning how to write Python scripts to automate network packet analysis tasks.
Browse courses on Python
Show steps
  • Install Python and the necessary libraries.
  • Follow online tutorials or documentation to learn Python scripting for Wireshark.
  • Write Python scripts to perform specific analysis tasks, such as filtering, parsing, or extracting data from packets.
Lead a Study Session on Wireshark
Reinforce your understanding by sharing your knowledge and assisting other students in learning the concepts and skills of Wireshark.
Browse courses on Wireshark
Show steps
  • Prepare materials and topics to cover.
  • Conduct a study session, explaining concepts and guiding participants through exercises.
  • Facilitate discussions and answer questions.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Wireshark Protocol Detection Challenge
Reinforce your understanding of network protocols by analyzing pcapng files and identifying the protocols used in various scenarios.
Browse courses on Wireshark
Show steps
  • Download pcapng files provided by the course instructor.
  • Open the pcapng files in Wireshark.
  • Inspect the packets and identify the protocols used.
  • Compare your findings with the provided solutions.
Wireshark Network Capture Documentation
Enhance your understanding of network capture and analysis by creating detailed documentation of a network capture using Wireshark.
Browse courses on Wireshark
Show steps
  • Capture network traffic using Wireshark.
  • Analyze the captured packets to identify network activity.
  • Create a detailed report documenting the network capture, including packet analysis and interpretation.
Wireshark Troubleshooting Workshop
Collaborate with peers to solve network troubleshooting problems using Wireshark. Engage in discussions, share insights, and learn from diverse perspectives.
Browse courses on Wireshark
Show steps
  • Join a peer study group or online forum.
  • Present a network troubleshooting problem to the group.
  • Collaborate with peers to analyze pcapng files and identify the root cause of the problem.
  • Share your findings and discuss possible solutions.
Contribute to Wireshark Development
Deepen your understanding of Wireshark's functionality and contribute to its development by reporting bugs, suggesting features, or writing code.
Browse courses on Wireshark
Show steps
  • Familiarize yourself with the Wireshark codebase and development process.
  • Identify areas where you can contribute.
  • Submit bug reports, feature requests, or code contributions through the appropriate channels.

Career center

Learners who complete Wireshark: Packet Analysis and Ethical Hacking: Core Skills will develop knowledge and skills that may be useful to these careers:
Ethical Hacker
Ethical Hackers use their knowledge of networking protocols and technologies to identify and exploit security vulnerabilities in computer networks. They use this information to help organizations improve the security of their networks. This course can help Ethical Hackers by providing them with a deep understanding of how networks work and how to troubleshoot network problems. The course also covers ethical hacking techniques, which are essential for ethical hackers.
Penetration Tester
Penetration Testers use their knowledge of networking protocols and technologies to identify and exploit security vulnerabilities in computer networks. They use this information to help organizations improve the security of their networks. This course can help Penetration Testers by providing them with a deep understanding of how networks work and how to troubleshoot network problems. The course also covers ethical hacking techniques, which are essential for penetration testers.
Network Security Analyst
Network Security Analysts protect computer networks from unauthorized access, use, disclosure, disruption, modification, or destruction. They use their knowledge of networking protocols and technologies to identify and mitigate security risks. This course can help Network Security Analysts by providing them with a deep understanding of how networks work and how to troubleshoot network problems. The course also covers ethical hacking techniques, which can be helpful for analysts who need to test the security of their networks.
Network Engineer
Network Engineers design, build, and maintain computer networks. They use their knowledge of networking protocols and technologies to ensure that networks are reliable, secure, and efficient. This course can help Network Engineers by providing them with a deep understanding of how networks work and how to troubleshoot network problems. The course also covers ethical hacking techniques, which can be helpful for engineers who need to test the security of their networks.
Cybersecurity Architect
Cybersecurity Architects design and implement security measures to protect computer networks and data from unauthorized access, use, disclosure, disruption, modification, or destruction. They use their knowledge of networking protocols and technologies to identify and mitigate security risks. This course can help Cybersecurity Architects by providing them with a deep understanding of how networks work and how to troubleshoot network problems. The course also covers ethical hacking techniques, which can be helpful for architects who need to test the security of their networks.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's computer networks and data from unauthorized access, use, disclosure, disruption, modification, or destruction. They use their knowledge of networking protocols and technologies to identify and mitigate security risks. This course can help Information Security Analysts by providing them with a deep understanding of how networks work and how to troubleshoot network problems. The course also covers ethical hacking techniques, which can be helpful for analysts who need to test the security of their networks.
Security Engineer
Security Engineers design, implement, and maintain security systems to protect computer networks and data from unauthorized access, use, disclosure, disruption, modification, or destruction. They use their knowledge of networking protocols and technologies to identify and mitigate security risks. This course can help Security Engineers by providing them with a deep understanding of how networks work and how to troubleshoot network problems. The course also covers ethical hacking techniques, which can be helpful for engineers who need to test the security of their networks.
Computer Network Architect
Computer Network Architects design, build, and maintain computer networks. They use their knowledge of networking protocols and technologies to ensure that networks are reliable, secure, and efficient. This course can help Computer Network Architects by providing them with a deep understanding of how networks work and how to troubleshoot network problems. The course also covers ethical hacking techniques, which can be helpful for architects who need to test the security of their networks.
Information Security Manager
Information Security Managers plan and implement security measures to protect an organization's computer networks and data from unauthorized access, use, disclosure, disruption, modification, or destruction. They use their knowledge of networking protocols and technologies to identify and mitigate security risks. This course can help Information Security Managers by providing them with a deep understanding of how networks work and how to troubleshoot network problems. The course also covers ethical hacking techniques, which can be helpful for managers who need to test the security of their networks.
IT Auditor
IT Auditors evaluate the security of computer networks and systems to ensure that they are compliant with regulations and standards. They use their knowledge of networking protocols and technologies to identify and mitigate security risks. This course can help IT Auditors by providing them with a deep understanding of how networks work and how to troubleshoot network problems. The course also covers ethical hacking techniques, which can be helpful for auditors who need to test the security of their networks.
Malware Analyst
Malware Analysts investigate and analyze malware to identify its purpose and how it works. They use their knowledge of networking protocols and technologies to track down and analyze malware. This course can help Malware Analysts by providing them with a deep understanding of how networks work and how to troubleshoot network problems. The course also covers ethical hacking techniques, which can be helpful for analysts who need to investigate malware.
Computer Forensics Analyst
Computer Forensics Analysts investigate computer crimes and recover evidence from computer systems. They use their knowledge of networking protocols and technologies to track down and analyze evidence of computer crimes. This course can help Computer Forensics Analysts by providing them with a deep understanding of how networks work and how to troubleshoot network problems. The course also covers ethical hacking techniques, which can be helpful for analysts who need to investigate computer crimes.
Network Administrator
Network Administrators are responsible for the day-to-day operation of computer networks. They install, configure, and maintain network hardware and software, and they monitor networks for problems. This course can help Network Administrators by providing them with the skills they need to troubleshoot network problems and improve network performance. The course also covers ethical hacking techniques, which can be helpful for administrators who need to test the security of their networks.
IT Consultant
IT Consultants help organizations with their IT needs. They use their knowledge of networking protocols and technologies to help organizations design, build, and maintain their networks. This course can help IT Consultants by providing them with a deep understanding of how networks work and how to troubleshoot network problems. The course also covers ethical hacking techniques, which can be helpful for consultants who need to test the security of their clients' networks.
Data Analyst
Data Analysts use their knowledge of networking protocols and technologies to collect and analyze data from computer networks. They use this information to help organizations make better decisions. This course can help Data Analysts by providing them with a deep understanding of how networks work and how to troubleshoot network problems. The course also covers ethical hacking techniques, which can be helpful for analysts who need to collect data from networks.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Wireshark: Packet Analysis and Ethical Hacking: Core Skills.
Is an excellent resource for network professionals who want to learn how to use Wireshark. It provides clear and concise instructions on how to use Wireshark to troubleshoot network problems.
Great resource for those who want to learn about ethical hacking. It provides a step-by-step approach to hacking and includes case studies of real-world hacks.
Provides a good overview of computer networking. It can be used as a reference for those who want to learn more about the OSI model and other networking concepts.
Provides a comprehensive overview of computer networks. It can be used as a reference for those who want to learn more about the OSI model and other networking concepts.
Classic reference on TCP/IP. It great resource for those who want to learn more about the details of the TCP/IP protocol suite.
Provides a practical guide to network security monitoring. It covers a wide range of topics, including incident detection, response, and forensics.
Great resource for those who want to learn how to troubleshoot network problems. It provides a step-by-step approach to troubleshooting and includes case studies of real-world network problems.
Provides a good overview of network security assessment. It can be used as a reference for those who want to learn more about network security tools and techniques.
Great resource for those who want to learn about ethical hacking. It provides a step-by-step approach to hacking and includes case studies of real-world hacks.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Wireshark: Packet Analysis and Ethical Hacking: Core Skills.
Getting Started with Wireshark
Most relevant
Wireshark for Basic Network Security Analysis
Most relevant
Analyzing and Decrypting TLS with Wireshark
Most relevant
Password and Wireless Attacks with Kali Linux
Most relevant
Protocol Deep Dive: Voice over Internet Protocol (VoIP)
Most relevant
Advanced Cyber Defense Analysis with Wireshark
Most relevant
Cisco Advanced Routing: Tier 3 Service Providers
Most relevant
Analyzing Network Protocols with Wireshark
Most relevant
Computer Networking
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser