We may earn an affiliate commission when you visit our partners.
Ross Bagurdes

This course will teach you how the primary encryption protocol used on the internet, TLS, operates. You’ll learn about the process and all the protocols involved in encryption using TLS.

Read more

This course will teach you how the primary encryption protocol used on the internet, TLS, operates. You’ll learn about the process and all the protocols involved in encryption using TLS.

TLS, sometimes called SSL, is the primary method of encryption for most communication on the internet including web and email communication. In this course, Analyzing and Decrypting TLS with Wireshark, you’ll learn the process and protocols TLS uses to encrypt traffic. First, you’ll see a visual description of how TLS encryption operates, explaining all of the critical steps of encryption and protocols involved. Next, you’ll observe a packet capture of an HTTPs website using Wireshark, and examine the unencrypted components of the TLS handshake. Finally, you’ll learn how to capture session keys on your local computer in order to decrypt TLS traffic in Wireshark, and then examine the entire TLS handshake process. By the end of this course, you’ll be able to capture HTTPs traffic with Wireshark, capture the session keys for the TLS encryption, and decrypt the HTTPs session in Wireshark.

Enroll now

What's inside

Syllabus

Course Overview
Introducing TLS Encryption
Visualizing the TLS Key Exchange
Visualizing TLS Encryption
Read more
Decrypting TLS Traffic
The TLS Handshake

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Suitable for those with professional experience and knowledge of encryption methods
Utilizes industry-standard tool, Wireshark, making it valuable for professionals
Taught by Ross Bagurdes, renowned expert in encryption and Wireshark
Covers advanced concepts such as analyzing TLS session keys and decrypting traffic
Assumes familiarity with HTTPs and TLS, making it more appropriate for intermediate learners
May require access to additional tools or resources beyond what is provided

Save this course

Save Analyzing and Decrypting TLS with Wireshark to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Analyzing and Decrypting TLS with Wireshark with these activities:
Review TLS 1.3 Handshake
Reviewing the TLS 1.3 handshake process will help you better understand the overall TLS protocol.
Show steps
  • Read the RFC specification for TLS 1.3
  • Watch a video tutorial on the TLS 1.3 handshake
  • Practice implementing a TLS 1.3 handshake in a programming language
Host a study group on TLS Encryption
Leading a study group on TLS Encryption provides an opportunity to consolidate your understanding, improve communication skills, and strengthen the learning of others.
Show steps
  • Prepare materials and discussion topics for the study group
  • Facilitate discussions, encourage participation, and answer questions from group members
  • Provide guidance and support to other participants in their understanding of TLS Encryption concepts
Follow a Tutorial on TLS Session Key Extraction
Following a tutorial on TLS session key extraction will help you learn how to extract session keys from TLS-encrypted traffic, which can be useful for security analysis and forensics.
Browse courses on Cryptography
Show steps
  • Find a tutorial on TLS session key extraction
  • Follow the tutorial and extract a session key from a TLS-encrypted traffic capture
Ten other activities
Expand to see all activities and additional details
Show all 13 activities
Follow Wireshark tutorials
Following Wireshark tutorials will provide additional context and depth on how TLS Encryption is used and its benefits.
Show steps
  • Locate reputable Wireshark tutorials
  • Follow the steps outlined in the tutorials
  • To deepen your understanding, try completing additional exercises provided in the tutorials
Analyze TLS Handshakes with Wireshark
Analyzing TLS handshakes with Wireshark will help you gain practical experience with the protocol and identify potential security issues.
Browse courses on Wireshark
Show steps
  • Install Wireshark on your computer
  • Capture a TLS handshake using Wireshark
  • Analyze the TLS handshake using the Wireshark TLS dissector
Follow tutorials on TLS decryption techniques
Following tutorials on TLS decryption techniques will provide additional practical knowledge and enhance your ability to decrypt TLS traffic.
Show steps
  • Locate and identify informative tutorials on TLS decryption
  • Follow the instructions and examples provided in the tutorials
  • Experiment with different decryption methods and tools mentioned in the tutorials
Attend a Cybersecurity Conference
Attending a cybersecurity conference will expose you to the latest research and trends in network security, including TLS.
Browse courses on Cybersecurity
Show steps
  • Find a cybersecurity conference that focuses on TLS
  • Attend the conference and participate in sessions and networking events
Practice capturing TLS traffic
Practicing capturing TLS traffic helps reinforce the knowledge gained from the course and provides hands-on experience.
Browse courses on Packet Capture
Show steps
  • Set up a lab environment for capturing TLS traffic
  • Use Wireshark to capture TLS traffic from websites and applications
  • Analyze captured TLS traffic to identify patterns and potential security issues
Practice decrypting TLS traffic with different tools
Practicing decrypting TLS traffic with different tools enhances your proficiency in using these tools and deepens your understanding of TLS encryption mechanisms.
Show steps
  • Gather various TLS decryption tools, such as Wireshark, SSLyze, or OpenSSL
  • Capture TLS traffic using Wireshark or other tools
  • Use different decryption tools to decrypt the captured TLS traffic and analyze the decrypted data
Create a TLS Decryption Tool
Creating a TLS decryption tool will challenge you to apply your understanding of the protocol and cryptography.
Show steps
  • Research existing TLS decryption tools
  • Design and implement your own TLS decryption tool
  • Test your tool against a variety of TLS-encrypted traffic
Attend an Advanced Wireshark Workshop
Attending an advanced workshop delves deeper into the complexities of Wireshark and its applications in TLS encryption investigations, improving your expertise.
Browse courses on Wireshark
Show steps
  • Research and identify suitable in-person or online workshops
  • Enroll in an Advanced Wireshark Workshop that aligns with your skill level
  • Actively participate and engage in the hands-on exercises and discussions
Contribute to Wireshark's development
Contributing to Wireshark's development through bug reporting, code contributions, or documentation enhancements deepens your understanding of its inner workings and exposes you to real-world TLS encryption challenges.
Browse courses on Wireshark
Show steps
  • Familiarize yourself with Wireshark's codebase and contribution guidelines
  • Identify areas where you can contribute, such as bug fixes, feature enhancements, or documentation improvements
  • Submit your contributions to Wireshark's community for review
Build a tool to automate TLS traffic analysis
Creating a tool to automate TLS traffic analysis allows you to streamline the process, enhance efficiency, and apply your knowledge of TLS encryption in a practical setting.
Browse courses on Automation
Show steps
  • Design the architecture and functionality of your TLS traffic analysis tool
  • Implement the tool using a suitable programming language and libraries
  • Test and refine your tool to ensure accuracy and efficiency

Career center

Learners who complete Analyzing and Decrypting TLS with Wireshark will develop knowledge and skills that may be useful to these careers:
Security Engineer
Security Engineers are responsible for designing and implementing security measures to protect computer systems and networks. This course will help them to understand the security risks and vulnerabilities associated with TLS, and how to mitigate these risks. It will also help them to develop more secure systems and networks by teaching them how to use TLS encryption effectively.
Network Security Engineer
Network Security Engineers are responsible for designing and implementing security measures to protect computer networks. This course will help them to understand the security risks and vulnerabilities associated with TLS, and how to mitigate these risks. It will also help them to develop more secure networks by teaching them how to use TLS encryption effectively.
Security Architect
Security Architects are responsible for designing and implementing security measures to protect computer systems and networks. This course will help them to understand the security risks and vulnerabilities associated with TLS, and how to mitigate these risks. It will also help them to develop more secure systems and networks by teaching them how to use TLS encryption effectively.
Computer Security Analyst
Computer Security Analysts can greatly benefit from this course, as TLS encryption is a critical component of network security. Understanding how TLS encryption works and how to decrypt TLS traffic will enable them to better protect networks and systems from cyberattacks. The course will provide them with the skills and knowledge needed to identify and mitigate security risks associated with TLS encryption, as well as to investigate and respond to security incidents involving TLS.
Cybersecurity Engineer
Cybersecurity Engineers play a vital role in protecting computer networks and systems from cyberattacks. This course will help them to understand the security risks and vulnerabilities associated with TLS, and how to mitigate these risks. It will also help them to develop more secure networks and systems by teaching them how to use TLS encryption effectively.
Network Administrator
Network Administrators are responsible for managing and maintaining computer networks. This course will help them to understand the security risks and vulnerabilities associated with TLS, and how to mitigate these risks. It will also help them to develop more secure networks by teaching them how to use TLS encryption effectively.
Cryptographer
Cryptographers are responsible for designing and analyzing cryptographic algorithms and protocols, which are essential for ensuring the security of data and communications. This course will help them to understand the security risks and vulnerabilities associated with TLS, and how to mitigate these risks. It will also help them to develop more secure cryptographic algorithms and protocols by teaching them how to use TLS encryption effectively.
IT Security Manager
IT Security Managers who are familiar with TLS encryption will be able to better manage the security of their organizations' information systems. This course will help them to understand the security risks and vulnerabilities associated with TLS, and how to mitigate these risks. It will also help them to develop more secure IT security policies and procedures by teaching them how to use TLS encryption effectively.
Computer Network Architect
Computer Network Architects can benefit from this course as TLS encryption sits at the core of secure network communication. A deeper understanding of TLS encryption will equip them to design, implement, and troubleshoot secure networks and network devices. The course will provide them with a clear understanding of how TLS encryption works, the protocols involved, and how to decrypt TLS traffic, all of which are essential skills for network architects.
Information Security Analyst
Information Security Analysts who are familiar with TLS encryption will be able to better protect the information they analyze. This course will help them to understand the security risks and vulnerabilities associated with TLS, and how to mitigate these risks. It will also help them to develop more secure information security practices by teaching them how to use TLS encryption effectively.
IT Auditor
IT Auditors who are familiar with TLS encryption will be able to better audit the security of information systems. This course will help them to understand the security risks and vulnerabilities associated with TLS, and how to mitigate these risks. It will also help them to develop more secure IT audit practices by teaching them how to use TLS encryption effectively.
Computer Programmer
Computer Programmers who are familiar with TLS encryption will be able to develop more secure software applications. This course will help them to understand the security risks and vulnerabilities associated with TLS, and how to mitigate these risks. It will also help them to develop more secure software applications by teaching them how to use TLS encryption effectively.
Data Analyst
Data Analysts who are familiar with TLS encryption will be able to better protect the data they analyze. This course will help them to understand the security risks and vulnerabilities associated with TLS, and how to mitigate these risks. It will also help them to develop more secure data analysis methods by teaching them how to use TLS encryption effectively.
Database Administrator
Database Administrators who are familiar with TLS encryption will be able to better protect the databases they manage. This course will help them to understand the security risks and vulnerabilities associated with TLS, and how to mitigate these risks. It will also help them to develop more secure database administration practices by teaching them how to use TLS encryption effectively.
Computer Hardware Engineer
Computer Hardware Engineers who possess understanding of TLS encryption will likely be more effective at designing and producing more secure hardware components, as they will have a clearer understanding of the security risks and vulnerabilities associated with TLS. This course may also help them to better understand the security implications of their designs and to make more informed decisions about the security features that they implement.

Reading list

We've selected 11 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Analyzing and Decrypting TLS with Wireshark.
Official study guide for Wireshark certification. Provides a structured approach to learning the tool used in the course for analyzing TLS traffic.
Textbook providing a comprehensive overview of data communications and networking. Useful for learners seeking a broader understanding of the context in which TLS operates.
Classic work on TCP/IP protocols. Provides a detailed understanding of the underlying network protocols that support TLS.
Textbook covering network security concepts and standards, including TLS. Provides a broader perspective on network security.
Practical guide to web application security. Provides insights into potential vulnerabilities related to TLS and web applications.
Comprehensive guide to HTTP, the protocol that often uses TLS for encryption. Provides a deeper understanding of the context in which TLS operates.
Practical guide to using OpenSSL for network security tasks, including TLS. Provides hands-on experience with a tool commonly used in TLS implementations.
Textbook providing a comprehensive overview of computer networking. Useful for learners seeking a broader understanding of the network infrastructure that supports TLS.
Comprehensive reference on applied cryptography. Provides a detailed and authoritative overview of the cryptographic techniques used in TLS.
NIST document defining the AES encryption algorithm, which is used in TLS. Provides the official specification for the algorithm.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Analyzing and Decrypting TLS with Wireshark.
Analyzing Network Protocols with Wireshark
Most relevant
Wireshark for Basic Network Security Analysis
Most relevant
Wireshark Configuration for Cyber Security Analysis
Most relevant
The Complete SSL and TLS Guide: HTTP to HTTPS
Most relevant
Getting Started with Wireshark
Most relevant
Wireshark for Beginners: Capture Packets
Most relevant
Packet Sniffing with Wireshark: Create Your First Filters
Most relevant
Advanced Cyber Defense Analysis with Wireshark
Most relevant
Wireshark: Packet Analysis and Ethical Hacking: Core...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser