• Online, Self-Paced
Course Description

Description
Secure your network with ease by leveraging this step-by-step tutorial on the powerful Wireshark 2.

Wireshark is a popular and powerful tool used to analyze the amount of bits and bytes that are flowing through a network. Wireshark deals with the second to seventh layer of network protocols, and the analysis made is presented in a human readable form.

Through this video, you will gain expertise in securing your network using Wireshark 2. At the start of the video, you will be taught how to install Wireshark, and will be introduced to its interface so you understand all its functionalities. Moving forward, you will discover different ways to create and use capture and display filters. Halfway through the video, you’ll be mastering the features of Wireshark, analyzing different layers of the network protocol, and looking for any anomalies. You will also learn about plugins and APIs.

As you reach to the end of the course, you will be taught how to use Wireshark for network security analysis and configure it for troubleshooting purposes.

About The Author

Andrew Crouthamel is an experienced Senior Network Engineer and IT trainer who resides in Doylestown, PA, and currently works with organizations such as NASA, ESA, JAXA, Boeing, and the US Air Force. His passion for teaching shows in his courses, which are filled with excitement and real world anecdotes.

Learning Objectives

Understand what network and protocol analysis is, and how it can help you
Use Wireshark to capture packets in your network
Filter captured traffic to only show what you need
Find out about useful statistics displays to make it easier to diagnose issues
Customize Wireshark to your own specifications
Analyze common network protocols and common network application protocols

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.