17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
[FTUForum.com] [UDEMY] Start Using Wireshark To Hack Like A Pro [FTU]
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
• Recognize the essential components of network communication
• Explore the different methods of setting up a packet capture
• Analyze packets using the Wireshark tool
• Analyze client to server communication with Wireshark
• Examine network traffic and identify potentially malicious traffic
• Examine the data within the network and how it shows up in Wireshark
Course content
all 35 lectures 03:30:12
Requirements
• This course is for you if you have a basic understanding of the command line and general knowledge of what an IP address is and TCP/IP. You should also know about the 7 layers of OSI model.
Description
This course will cover the process for conducting protocol analysis. This will serve as a foundation for the skill required for a number of different types of careers. Protocol analysis is the technique of analyzing what is or has taken place on a network. This is used by Security Operations Center analysts as well as network forensics investigators.
We will take static capture files that you will be provided and show you how to analyze them within the Wireshark tool. You will learn ways to quickly identify anything that is abnormal within a network packet capture. This will provide you with the initial skills for intrusion analysis, and also malware tracking and monitoring.
-The course prepares the student for understanding network protocol analysis -After the course you will have the initial skills for security or hacking classes
- Anyone who wants to understand the foundation of security skills and have knowledge for analyzing network traffic as well as potential intrusions will benefit from this course.
- This course is for beginners or people interested in learning about hacking and don't know where to start.
Who this course is for:
• This course is for beginners or people interested in learning about hacking and don't know where to start.
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
0. Websites you may like/How you can help Team-FTU.txt
237 B
1. Course Overview/1. Introduction.mp4
13.7 MB
1. Course Overview/1. Introduction.vtt
1.7 KB
10. Section 10 The Steps of Professional Hacking/1. The first step of professional hacking scanning methodology!.mp4
9.8 MB
10. Section 10 The Steps of Professional Hacking/1. The first step of professional hacking scanning methodology!.vtt
5.2 KB
10. Section 10 The Steps of Professional Hacking/2. The second step of the professional hacking methodology.mp4
16 MB
10. Section 10 The Steps of Professional Hacking/2. The second step of the professional hacking methodology.vtt
7.7 KB
10. Section 10 The Steps of Professional Hacking/3. The third step of the professional hacking methodology.mp4
5.5 MB
10. Section 10 The Steps of Professional Hacking/3. The third step of the professional hacking methodology.vtt
3.7 KB
10. Section 10 The Steps of Professional Hacking/4. The fourth step of the professional hacking methodology.mp4
24.2 MB
10. Section 10 The Steps of Professional Hacking/4. The fourth step of the professional hacking methodology.vtt
9 KB
10. Section 10 The Steps of Professional Hacking/5. The fifth step of the professional hacking methodology.mp4
23.1 MB
10. Section 10 The Steps of Professional Hacking/5. The fifth step of the professional hacking methodology.vtt
9.1 KB
10. Section 10 The Steps of Professional Hacking/6. The sixth step of the professional hacking methodology.mp4
88.4 MB
10. Section 10 The Steps of Professional Hacking/6. The sixth step of the professional hacking methodology.vtt
9.6 KB
10. Section 10 The Steps of Professional Hacking/7. Lecture 35 File extraction using Wireshark.mp4
191 MB
10. Section 10 The Steps of Professional Hacking/7. Lecture 35 File extraction using Wireshark.vtt
11.2 KB
2. Course Setup First Steps of Protocol Analysis/1. Download and Install Wireshark.mp4
6.5 MB
2. Course Setup First Steps of Protocol Analysis/1. Download and Install Wireshark.vtt
3.9 KB
2. Course Setup First Steps of Protocol Analysis/2. Work with Wireshark.mp4
10.3 MB
2. Course Setup First Steps of Protocol Analysis/2. Work with Wireshark.vtt
8.6 KB
2. Course Setup First Steps of Protocol Analysis/3. Review the First Packet capture in Wireshark..mp4
14.4 MB
2. Course Setup First Steps of Protocol Analysis/3. Review the First Packet capture in Wireshark..vtt
6.8 KB
2. Course Setup First Steps of Protocol Analysis/3.1 File1.pcapng.pcapng
7.3 MB
3. Network Communication at the Packet Level/1. Introduction.mp4
8 MB
3. Network Communication at the Packet Level/1. Introduction.vtt
6.3 KB
3. Network Communication at the Packet Level/2. Analyze Client to Server Communication with the Wireshark User Interface..mp4
19.6 MB
3. Network Communication at the Packet Level/2. Analyze Client to Server Communication with the Wireshark User Interface..vtt
7.5 KB
3. Network Communication at the Packet Level/3. Your first protocols.mp4
7.8 MB
3. Network Communication at the Packet Level/3. Your first protocols.vtt
5.8 KB
3. Network Communication at the Packet Level/4. Examine protocol packets within the Wireshark tool..mp4
15.9 MB
3. Network Communication at the Packet Level/4. Examine protocol packets within the Wireshark tool..vtt
7.1 KB
3. Network Communication at the Packet Level/5. Network communication quiz.html
146 B
4. TCPIP Foundation/1. Introduction.mp4
6.6 MB
4. TCPIP Foundation/1. Introduction.vtt
5 KB
4. TCPIP Foundation/2. Protocol Analysis at the network level using Wireshark.mp4
9.8 MB
4. TCPIP Foundation/2. Protocol Analysis at the network level using Wireshark.vtt
4.9 KB
4. TCPIP Foundation/2.1 File2.zip.zip
5.9 KB
4. TCPIP Foundation/3. Interpreting Connections and Protocols.mp4
3.8 MB
4. TCPIP Foundation/3. Interpreting Connections and Protocols.vtt
2.5 KB
4. TCPIP Foundation/4. Intermediate Protocol Analysis of static captures using Wireshark..mp4
8.6 MB
4. TCPIP Foundation/4. Intermediate Protocol Analysis of static captures using Wireshark..vtt
4.5 KB
4. TCPIP Foundation/4.1 File3.pcapng.pcapng
2.2 MB
4. TCPIP Foundation/5. TCPIP Foundation Quiz.html
146 B
5. Starting your First Capture/1. Introduction.mp4
4.4 MB
5. Starting your First Capture/1. Introduction.vtt
3.4 KB
5. Starting your First Capture/2. Live capture exercise.mp4
20.5 MB
5. Starting your First Capture/2. Live capture exercise.vtt
7.9 KB
5. Starting your First Capture/3. Analyzing the live capture using Wireshark..mp4
36.5 MB
5. Starting your First Capture/3. Analyzing the live capture using Wireshark..vtt
11.2 KB
6. Working with Capture Files in Wireshark/1. Introduction.mp4
5.3 MB
6. Working with Capture Files in Wireshark/1. Introduction.vtt
3.8 KB
6. Working with Capture Files in Wireshark/2. Saving the capture to a file.mp4
24.1 MB
6. Working with Capture Files in Wireshark/2. Saving the capture to a file.vtt
5.6 KB
6. Working with Capture Files in Wireshark/3. Advanced Capture Methods.mp4
5 MB
6. Working with Capture Files in Wireshark/3. Advanced Capture Methods.vtt
3.6 KB
6. Working with Capture Files in Wireshark/4. Advanced Capture Scenario Analysis Methods With Wireshark..mp4
28.8 MB
6. Working with Capture Files in Wireshark/4. Advanced Capture Scenario Analysis Methods With Wireshark..vtt
6.2 KB
6. Working with Capture Files in Wireshark/5. Working with capture files within Wireshark.html