Last updated 2/2019MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 3.21 GB | Duration: 6h 6m
Analyze network traffic to identify security problems, find bottlenecks, and maximize resource efficiency What you'll learn Discover the key features of Wireshark enabling you to analyze your packet capture. Navigate through, split, and work with large traffic files Use the TCP/IP Resolution Flowchart to identify possible communication faults Create statistical charts and graphs to pinpoint performance issues Analyzing different layers of the network protocol, and also looking in to its security. Network switching, through IP, and then move on to Networking performance problems. Decrypt encrypted wireless traffic and secure network to keep track of malware. Requirements A basic familiarity with common network and application service terms and technologies is assumed. Description Wireshark is the world's foremost & most widely-used network protocol analyzer, which helps you monitor activities on your network at a microscopic level. It is also used for network troubleshooting, analysis, software, and communications protocol development.With this hands-on practical course, you'll start with basics of wireshark to analyze data and solve problems which primarily focus on enhancing your network analysis and web traffic capture skills to build a strong secure foundation. Then you will be trained on Wireshark and TCP/IP communications analysis to identify the most common causes of performance problems in TCP/IP communications. Moving further, you'll be introduce to a command line-version of Wireshark which is tshark. Next, you will also learn about various types of network cyber attack and essential remedies & troubleshooting your network using Wireshark.Contents and OverviewThis training program includes 3 complete courses, carefully chosen to give you the most comprehensive training possible.The first course, Analyzing Network Traffic with Wireshark 2.6 will give you real-world knowledge about all Wireshark topics followed by a step-by-step implementation guideline while showing you how to work on it practically . This course bs by installing Wireshark and familiarizing you with the GUI interface, then guides you through some important concepts to set up your own home/office lab, which will enable you to efficiently analyze data and solve problems. Throughout the course, we primarily focus on enhancing your network analysis and web traffic capture skills to build a strong secure foundation. By the end of the course, you will not only be comfortable working with Wireshark but also confident enough to implement in your day-to-day work life.The second course, Wireshark Recipes will teach you to use Wireshark to identify the most common causes of performance problems in TCP/IP communications. You will develop a thorough understanding of how to use Wireshark efficiently to spot the primary sources of network performance problems, and you will prepare for the latest Wireshark certification exam.The third course, Mastering Wireshark 2.6 starts setting up a Wireshark lab in the Windows and Linux operating systems. We dive into the overall process of packet capturing and Wireshark filters. Then, we introduce tshark, a command line-version of Wireshark, and we learn about various tshark commands. Later, we are introduced to various types of network cyber attack and essential remedies. We also go through an array of techniques to monitor and secure these attacks using Wireshark. Lastly, we cover network troubleshooting using Wireshark.Towards the end of the course, you'll use Wireshark efficiently to find primary sources of network performance problems and also different ways to secure networks.About the Authors:Mohammad Junaid, CCIE #43891, is an IT Networking Consultant with over four years' experience in the industry. He is currently based in the Middle East. He is specialized in networking fields which includes routing switching, security, and data center. He has worked with several large private and public-sector enterprises in planning, designing, and implementing IT solutions.A computer and cyber security expert, Sunil Gupta consults in information technology with a focus on cyber security. He is an invited speaker for, and a member of, many key organizations. Sunil is a technology visionary and cyber security professional who thrives on solving complex problems. His career highlights include working with various companies, organizations, and products. His primary passion is cyber security, but he understands that, to be successful at securing an organization, you must have a detailed understanding of networks and related fields. He is passionate about customer service and his role as a cyber security expert, and always exceeds his clients' expectations. Sunil performs leading-edge security consulting and works in research and development as a security expert to advance state-of-the-art information systems security. Overview Section 1: Analyzing Network Traffic with Wireshark 2.6 Lecture 1 The Course Overview Lecture 2 Introduction to Wireshark Lecture 3 Installing Wireshark on Windows Lecture 4 Preparing Your Computer for Wireshark Lecture 5 Getting Familiar with the Wireshark GUI Lecture 6 Setting Up Profiles Lecture 7 Working with Preferences Lecture 8 Your First Network Traffic Capture Lecture 9 Setting Filters Before Capture Lecture 10 Finding and Working with Captured Data Lecture 11 Setting Display Filters after Capture Lecture 12 Using Expressions Lecture 13 Working with Flow Graphs Lecture 14 Setting Stamps and Zone Lecture 15 Following TCP Streams Lecture 16 Analyzing and Troubleshooting Basic Real-life Scenarios Lecture 17 Saving Capture Lecture 18 Importixporting Capture Files Lecture 19 Meg Capture Files Section 2: Wireshark Recipes Lecture 20 The Course Overview Lecture 21 What Is Wireshark and Why we need it? Lecture 22 Basic Networking Teologies Lecture 23 OSI and TCP/IP Models and Why We Need to Understand? Lecture 24 How to Get Industry Wireshark Certification? Lecture 25 Setup Virtual Machine Lecture 26 Setup Linux and Windows Machine Lecture 27 Installation of Wireshark (Windows and Linux) Lecture 28 Wireshark Interfaces Lecture 29 Start User Interface of Wireshark Lecture 30 IP and Port Filtering Lecture 31 Protocol Filters Lecture 32 Packet Analysis Lecture 33 Demonstration of Insecure Networks Lecture 34 Save Wireshark Output Lecture 35 Wireshark Command Line Interface Lecture 36 First Usage of Tshark Lecture 37 Tshark File Output Lecture 38 Tshark Limits Lecture 39 Field Separation Lecture 40 Network Attacks in Network Lecture 41 Flooding in Network Lecture 42 Monitor Flooding Using Wireshark Lecture 43 Network Scanning Using Nmap and Nessus Lecture 44 Monitor Network Scanning Using Wireshark Lecture 45 Tackle Network Anomalies with Baseline Traffic Lecture 46 Highlight Potential Performance Issues with Coloring Rules Lecture 47 Summarize Network Packets and Performance Using I/O Graphs Lecture 48 Detect Latency Problems with Delta Values Lecture 49 Troubleshoot Connection Refusals and Redirections Lecture 50 Troubleshoot Network Latency - Bandwidth and Round Trip Section 3: Mastering Wireshark 2.6 Lecture 51 The Course Overview Lecture 52 Wireshark Course Overview Lecture 53 Wireshark Installation in Windows Lecture 54 Wireshark Installation in Linux Lecture 55 Traffic Capturing in Wireshark Lecture 56 Saving and Exporting Packets Lecture 57 Annotating and Printing Packets Lecture 58 Remote Capturing Setup Lecture 59 Usage of Remote Capture Lecture 60 Display Filters Lecture 61 Capture Filters Lecture 62 Follow Streams Lecture 63 Advance Filters Lecture 64 UDP Analysis Lecture 65 TCP Analysis Lecture 66 HTTP Analysis Lecture 67 DHCP Analysis Lecture 68 FTP Analysis Lecture 69 802.11 Analysis Lecture 70 Email Analysis Lecture 71 VOIP Analysis Lecture 72 Running Command line Wireshark Lecture 73 Running Tshark (Teal Based Wireshark) Lecture 74 Running Tcpdump Lecture 75 Running Dumpcap Lecture 76 Monitor Dos and DDos Attack Lecture 77 Monitor Port Scanning Attack Lecture 78 Monitor Phishing Attack Lecture 79 Monitor Web Vulnerabilities Lecture 80 Monitor Encrypted Traffic Lecture 81 Monitor Malware Attack Lecture 82 Coloring Rules to Highlight Potential Performance Lecture 83 Monitor Network Performance Using I/O Graphs Lecture 84 Baseline Traffic to Tackle Network Anomalies Lecture 85 Delta Value to Detect Latency Problems Lecture 86 Analyzing and Troubleshooting Client Connectivity Issues Lecture 87 Summary This course targets penetration testers, cyber security professionals, network eeers, information security professionals, administrators, ethical hackers, security professionals, network administrators, IT professionals who are interested in getting familiar with Wireshark to analyze network traffic & develop or enhance their network analysis skills. HomePage: gfxtra__Complete_G.part1.rar.html gfxtra__Complete_G.part2.rar.html
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.