We may earn an affiliate commission when you visit our partners.
Course image
Viranson HOUNNOUVI

Ce projet guidé “Initiation à Wireshark pour l'analyse de paquets sous linux” est destiné principalement aux Administrateurs réseaux et Administrateurs Systèmes. Il est aussi destiné à toute personne intéressée par la capture et l’inspection de paquets avec Wireshark.

Read more

Ce projet guidé “Initiation à Wireshark pour l'analyse de paquets sous linux” est destiné principalement aux Administrateurs réseaux et Administrateurs Systèmes. Il est aussi destiné à toute personne intéressée par la capture et l’inspection de paquets avec Wireshark.

Dans ce projet guidé d'une heure, vous apprendrez à installer Wireshark sous Linux, capturer des paquets de données avec Wireshark pour les analyser, filtrer les données de paquets et obtenir des statistiques sur les paquets capturés.

Pour parvenir à la réalisation de ce projet guidé, nous avancerons pas à pas sur un ensemble de 7 tâches avec deux exercices pratiques auto-évaluatifs

Ce projet guidé, totalement présenté en Français, est spécialement conçu avec des explications approfondies sur les différents éléments qui y sont abordés.

Pour profiter au maximum de ce projet guidé qui se déroulera dans un environnement Linux, il vous sera nécessaire d’avoir des connaissances sur les protocoles réseau et le modèle TCP/IP et aussi d’avoir les bases du shell Linux, spécifiquement maîtriser les commandes d’installation et de gestion de paquets logiciels sous Linux

Enroll now

Two deals to help you save

What's inside

Syllabus

Présentation du projet
Ce projet guidé “Initiation à Wireshark pour l'analyse de paquets sous linux” est destiné principalement aux Administrateurs réseaux et Administrateurs Systèmes. Il est aussi destiné à toute personne intéressée par la capture et l’inspection de paquets avec Wireshark.Dans ce projet guidé d'environ 2 heures, vous apprendrez à installer Wireshark sous Linux, capturer des paquets de données avec Wireshark pour les analyser, filtrer les données de paquets et obtenir des statistiques sur les paquets capturés.Pour parvenir à la réalisation de ce projet guidé, nous avancerons pas à pas sur un ensemble de 7 tâches avec deux exercices pratiques auto-évaluatifs Ce projet guidé, totalement présenté en Français, est spécialement conçu avec des explications approfondies sur les différents éléments qui y sont abordés.Pour profiter au maximum de ce projet guidé qui se déroulera dans un environnement Linux, il vous sera nécessaire d’avoir des connaissances sur les protocoles réseau et le modèle TCP/IP et aussi d’avoir les bases du shell Linux, spécifiquement maîtriser les commandes d’installation et de gestion de paquets logiciels sous Linux.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Ce cours vous permettra de maîtriser les aspects fondamentaux de Wireshark, un outil indispensable pour l'analyse de paquets réseau sous Linux
Ce cours est parfaitement adapté aux administrateurs réseau et système qui cherchent à améliorer leurs compétences en matière d'analyse de trafic réseau
Ce cours vous permettra de capturer et d'analyser efficacement les paquets de données afin d'identifier les problèmes de réseau et de sécurité
Vous bénéficierez de démonstrations pratiques et d'exercices qui vous permettront d'appliquer directement les concepts appris
Les connaissances préalables en protocoles réseau et en shell Linux sont nécessaires pour suivre ce cours efficacement

Save this course

Save Initiation à Wireshark pour l'analyse de paquets sous linux to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Initiation à Wireshark pour l'analyse de paquets sous linux with these activities:
Review networking protocols
Reviewing networking protocols will refresh your knowledge of the fundamental concepts that Wireshark leverages.
Browse courses on Networking Protocols
Show steps
  • Review OSI model layers
  • Review TCP/IP protocol suite
  • Review common networking protocols (e.g., HTTP, DNS, SMTP)
Join a study group for the course
Joining a study group will provide you with a support network and allow you to learn from your peers.
Show steps
  • Find a study group for the course
  • Attend study group meetings regularly
  • Participate in discussions and share your knowledge
  • Collaborate on projects and assignments
Capture and inspect packets using Wireshark
Capturing and inspecting packets is a core skill that you will practice throughout the course. Completing this practice before the course will help you get ahead.
Browse courses on Packet Analysis
Show steps
  • Start Wireshark and select an interface to capture packets
  • Start generating network traffic
  • Stop the capture and inspect the captured packets
  • Identify common protocol headers and fields
Two other activities
Expand to see all activities and additional details
Show all five activities
Create a network traffic report
Creating a network traffic report will allow you to apply the skills you learn in the course to a practical scenario.
Browse courses on Network Traffic Analysis
Show steps
  • Capture network traffic using Wireshark
  • Analyze the captured packets and identify key trends and insights
  • Create a report summarizing your findings
  • Present your report to an audience
Volunteer at a network security event
Volunteering at a network security event will allow you to apply your skills in a real-world setting.
Browse courses on network security
Show steps
  • Find a network security event to volunteer at
  • Contact the event organizers and express your interest in volunteering
  • Attend the event and assist with network security tasks
  • Network with other professionals in the field

Career center

Learners who complete Initiation à Wireshark pour l'analyse de paquets sous linux will develop knowledge and skills that may be useful to these careers:
Cybersecurity Analyst
Cybersecurity Analysts protect computer systems from cyberattacks. They monitor networks for suspicious activity, investigate cyberattacks, and develop cybersecurity policies. This course can be helpful for Cybersecurity Analysts by providing them with a foundation in packet analysis with Wireshark. Wireshark is a network protocol analyzer that can be used to monitor network traffic and identify cyberattacks. By learning how to use Wireshark, Cybersecurity Analysts can gain a deeper understanding of how networks work and how to identify cyberattacks.
Network Security Engineer
Network Security Engineers design, build, and maintain secure networks. They implement security policies, monitor networks for security breaches, and respond to security incidents. This course can be helpful for Network Security Engineers by providing them with a foundation in packet analysis with Wireshark. Wireshark is a network protocol analyzer that can be used to monitor network traffic and identify security breaches. By learning how to use Wireshark, Network Security Engineers can gain a deeper understanding of how networks work and how to identify security breaches.
Network Consultant
Network Consultants provide advice to organizations on how to design, build, and maintain computer networks. They assess an organization's network needs, design network solutions, and implement network solutions. This course can be helpful for Network Consultants by providing them with a foundation in packet analysis with Wireshark. Wireshark is a network protocol analyzer that can be used to analyze network traffic and identify network performance problems. By learning how to use Wireshark, Network Consultants can gain a deeper understanding of how networks work and how to design and build networks for optimal performance.
IT Auditor
IT Auditors evaluate the security of computer systems. They review security policies, conduct security audits, and make recommendations for improving security. This course can be helpful for IT Auditors by providing them with a foundation in packet analysis with Wireshark. Wireshark is a network protocol analyzer that can be used to monitor network traffic and identify security breaches. By learning how to use Wireshark, IT Auditors can gain a deeper understanding of how networks work and how to identify security breaches.
Systems Administrator
Systems Administrators are responsible for the day-to-day operation of computer systems. They install, configure, and maintain computer hardware and software. They also monitor systems for security breaches and troubleshoot problems. This course can be helpful for Systems Administrators by providing them with a foundation in packet analysis with Wireshark. Wireshark is a network protocol analyzer that can be used to troubleshoot network problems and monitor network traffic. By learning how to use Wireshark, Systems Administrators can gain a deeper understanding of how networks work and how to troubleshoot network problems.
Security Analyst
Security Analysts are responsible for protecting computer systems from security breaches. They monitor systems for suspicious activity, investigate security breaches, and develop security policies. This course can be helpful for Security Analysts by providing them with a foundation in packet analysis with Wireshark. Wireshark is a network protocol analyzer that can be used to monitor network traffic and identify security breaches. By learning how to use Wireshark, Security Analysts can gain a deeper understanding of how networks work and how to identify security breaches.
Network Architect
Network Architects design and build computer networks. They determine the best network topology for a given organization, select network hardware and software, and configure networks for optimal performance. This course can be helpful for Network Architects by providing them with a foundation in packet analysis with Wireshark. Wireshark is a network protocol analyzer that can be used to analyze network traffic and identify network performance problems. By learning how to use Wireshark, Network Architects can gain a deeper understanding of how networks work and how to design and build networks for optimal performance.
Information Security Manager
Information Security Managers are responsible for the overall security of an organization's information systems. They develop and implement security policies, manage security risks, and oversee security audits. This course can be helpful for Information Security Managers by providing them with a foundation in packet analysis with Wireshark. Wireshark is a network protocol analyzer that can be used to monitor network traffic and identify security breaches. By learning how to use Wireshark, Information Security Managers can gain a deeper understanding of how networks work and how to protect information systems from security breaches.
Computer Forensic Analyst
Computer Forensic Analysts investigate computer crimes. They analyze computer systems for evidence of criminal activity, recover deleted files, and provide expert testimony in court. This course can be helpful for Computer Forensic Analysts by providing them with a foundation in packet analysis with Wireshark. Wireshark is a network protocol analyzer that can be used to analyze network traffic and identify evidence of criminal activity. By learning how to use Wireshark, Computer Forensic Analysts can gain a deeper understanding of how networks work and how to investigate computer crimes.
Network Engineer
Network Engineers design, build, and maintain computer networks. They monitor networks for security breaches, troubleshoot problems, and upgrade networks as needed. This course can be helpful for Network Engineers by providing them with a foundation in packet analysis with Wireshark. Wireshark is a network protocol analyzer that can be used to troubleshoot network problems and monitor network traffic. By learning how to use Wireshark, Network Engineers can gain a deeper understanding of how networks work and how to troubleshoot network problems.
Data Engineer
Data Engineers design, build, and maintain data pipelines. They collect data from various sources, transform data into usable formats, and store data in databases. This course may be helpful for Data Engineers by providing them with a foundation in packet analysis with Wireshark. Wireshark is a network protocol analyzer that can be used to analyze network traffic and identify data transfer problems. By learning how to use Wireshark, Data Engineers can gain a deeper understanding of how networks work and how to design and build data pipelines for optimal performance.
Technical Writer
Technical Writers create documentation for software and hardware products. They analyze products, write user manuals, and create training materials. This course may be helpful for Technical Writers by providing them with a foundation in packet analysis with Wireshark. Wireshark is a network protocol analyzer that can be used to analyze network traffic and identify product performance problems. By learning how to use Wireshark, Technical Writers can gain a deeper understanding of how networks work and how to write documentation for software and hardware products.
Software Engineer
Software Engineers design, develop, and maintain software applications. They analyze user needs, design software solutions, and implement software solutions. This course may be helpful for Software Engineers by providing them with a foundation in packet analysis with Wireshark. Wireshark is a network protocol analyzer that can be used to analyze network traffic and identify software performance problems. By learning how to use Wireshark, Software Engineers can gain a deeper understanding of how networks work and how to design and develop software applications for optimal performance.
Business Analyst
Business Analysts analyze business processes and develop solutions to improve business performance. They gather requirements, analyze data, and develop recommendations. This course may be helpful for Business Analysts by providing them with a foundation in packet analysis with Wireshark. Wireshark is a network protocol analyzer that can be used to analyze network traffic and identify business process performance problems. By learning how to use Wireshark, Business Analysts can gain a deeper understanding of how networks work and how to develop solutions to improve business performance.
Project Manager
Project Managers plan, execute, and close projects. They develop project plans, manage project budgets, and track project progress. This course may be helpful for Project Managers by providing them with a foundation in packet analysis with Wireshark. Wireshark is a network protocol analyzer that can be used to analyze network traffic and identify project management problems. By learning how to use Wireshark, Project Managers can gain a deeper understanding of how networks work and how to manage projects for optimal performance.

Reading list

We've selected 13 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Initiation à Wireshark pour l'analyse de paquets sous linux.
Classic work on TCP/IP, and is essential reading for anyone who wants to understand the protocols that underpin the internet. It provides a detailed overview of the TCP/IP protocol suite, and includes a wealth of technical information.
Comprehensive guide to TCP/IP, and valuable resource for anyone who wants to learn more about the protocols that underpin the internet. It covers a wide range of topics, including network fundamentals, TCP/IP protocols, and network security.
Comprehensive textbook on data communications and networking, and valuable resource for anyone who wants to learn more about the fundamentals of networking. It covers a wide range of topics, including network fundamentals, TCP/IP protocols, and network security.
Comprehensive textbook on network security, and valuable resource for anyone who wants to learn more about the fundamentals of network security. It covers a wide range of topics, including network security fundamentals, cryptography, and network security protocols.
Comprehensive textbook on cryptography and network security, and valuable resource for anyone who wants to learn more about the fundamentals of cryptography and network security. It covers a wide range of topics, including cryptography fundamentals, network security protocols, and network security applications.
Provides a comprehensive overview of network analysis, with a focus on using Wireshark to capture, analyze, and troubleshoot network traffic. It covers a wide range of topics, including network fundamentals, TCP/IP protocols, and network security.
Ce livre fournit une base solide dans les concepts fondamentaux des réseaux informatiques. Il est écrit dans un style clair et concis, ce qui le rend facile à lire et à comprendre.
Ce livre est une référence classique sur le protocole TCP/IP. Il fournit une description détaillée des protocoles TCP/IP, de leur fonctionnement et de leur interaction.
Ce livre fournit des techniques détaillées sur la façon de collecter des informations sur les réseaux informatiques. Il couvre un large éventail de sujets, de la recherche DNS à l'analyse du trafic réseau.
Ce livre fournit une introduction aux concepts et techniques de sécurité réseau. Il couvre un large éventail de sujets, de l'analyse des vulnérabilités à la réponse aux incidents.
Ce livre fournit une introduction aux concepts fondamentaux des réseaux informatiques. Il est écrit dans un style clair et concis, ce qui le rend facile à lire et à comprendre.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Initiation à Wireshark pour l'analyse de paquets sous linux.
Configurer un pare-feu avec UFW sous Linux
Most relevant
Installer et configurer la pile LAMP sous Ubuntu
Most relevant
Créer et gérer des réseaux Docker sous Linux.
Most relevant
Héberger et gérer plusieurs sites Web sous Linux avec...
Most relevant
Gérer les fichiers et répertoires sous Linux via le Shell
Most relevant
Installation et gestion des paquets logiciels sous Linux
Most relevant
Configurer un environnement dev avec la pile LEMP sous...
Most relevant
Créer des connexions sécurisées avec Tor pour l'anonymat
Most relevant
Configurer et sécuriser un serveur de fichiers sous Linux
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser