17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
Overcome real-world network problems and prevent your systems from vicious attack
Video Details
ISBN 9781789134360
Course Length 2 hours 35 minutes
Table of Contents
• WIRESHARK LAB SETUP
• GETTING STARTED
• TRAFFIC FILTERING
• PROTOCOL ANALYSIS
• COMMAND-LINE WIRESHARK
• MONITOR CYBER ATTACKS
• WIRESHARK TROUBLESHOOTING
Video Description
Wireshark is the world's foremost and most widely-used network protocol analyzer. It lets you see what's happening on your network at a microscopic level. Wireshark deals with the second to the seventh layers of network protocols, and the analysis made is presented in a human-readable form. It is used for network troubleshooting, analysis, software, and communications protocol development.
This course starts setting up a Wireshark lab in the Windows and Linux operating systems. We dive into the overall process of packet capturing and Wireshark filters. Then, we introduce tshark, a command line-version of Wireshark, and we learn about various tshark commands. Later, we are introduced to various types of network cyber attack and essential remedies. We also go through an array of techniques to monitor and secure these attacks using Wireshark. Lastly, we cover network troubleshooting using Wireshark.
Towards the end of the course, you'll use Wireshark efficiently to find primary sources of network performance problems and also different ways to secure networks.
Style and Approach
This course aims to provide complete coverage of every objective in Wireshark. The course is filled with apt and concise demonstrations and explanations to help you to understand Wireshark and its uses.
What You Will Learn
• Look into security & flaws of different protocols, by analysing security and network protocols.
• Taking you through your first packet capture, filtering out, saving & exporting packets, and analyzing them
• Discover different ways to create, capture traffic and display filters.
• Display statistics for inconsistent capture and locate problems automatically found in packet capture
• Analyzing different layers of the network protocol, and also looking in to its security.
• Network switching, through IP, and then move on to Networking performance problems.
• Decrypt encrypted wireless traffic and secure network to keep track of malware.
Authors
Sunil Gupta
A computer and cyber security expert, Sunil Gupta consults in information technology with a focus on cyber security. He is an invited speaker for, and a member of, many key organizations.
Sunil is a technology visionary and cyber security professional who thrives on solving complex problems. His career highlights include working with various companies, organizations and products. His primary passion is cyber security, but he understands that, to be successful at securing an organization, you must have a detailed understanding of networks and related fields. He is passionate about customer service and his role as a cyber-security expert, and always exceeds his clients' expectations.
Sunil performs leading-edge security consulting and works in research and development as a security expert to advance the state of the art in information systems security.
For More Udemy Free Courses >>> http://www.freetutorials.eu
For more Lynda and other Courses >>> https://www.freecoursesonline.me/
Our Forum for discussion >>> https://discuss.freetutorials.eu/