Get in Touch

Course Outline

  • Command-Line Tools and Their Usage
  • TShark and Dumpcap Command-Line Utilities
  • Capinfos Command-Line Tool
  • Editcap Command-Line Tool
  • Mergecap Command-Line Tool
  • Text2pcap Command-Line Tool
  • Splitting and Merging Trace Files
  • Advanced Usage of Capture and Display Filters
  • Writing Advanced Capture Filter Scripts
  • Developing Advanced Display Filters
  • Utilizing Triggered Filters
  • Advanced Application of the Expert System
  • Addressing Congestion Issues: Shattered Windows and Flooding
  • Establishing Baseline Network Communications
  • Identifying Unusual Network Communications
  • Vulnerabilities in the TCP/IP Resolution Process
  • Laboratory Exercises and Case Studies
  • Analyzing Network Activity: "Who Is Talking?"
  • Detecting Port Scans
  • Identifying Mutant Scans
  • Conducting IP Scans
  • Application Mapping
  • OS Fingerprinting
  • Laboratory Exercises and Case Studies
  • VoIP Traffic Analysis
  • SIP Analysis and Troubleshooting
  • RTP, RTCP, and Media Stream Analysis
  • Creating VoIP Filters and Analysis Profiles
  • Laboratory Exercises and Case Studies
  • Application Analysis and Troubleshooting
  • HTTP Analysis and Troubleshooting
  • FTP Analysis and Troubleshooting
  • DNS Operation and Troubleshooting
  • Video Transmission Analysis
  • Network-Related Database Issues
  • Fundamentals of Network Security and Forensics
  • Information Gathering: What to Look For
  • Recognizing Unusual Traffic Patterns
  • Complementary Tools
  • Detecting Suspicious Security Patterns
  • MAC and IP Address Spoofing
  • Attack Signatures and Their Locations
  • ARP Poisoning
  • Header and Sequencing Signatures
  • Attacks and Exploits
  • TCP Splicing and Anomalous Traffic
  • DoS and DDoS Attacks
  • Protocol Scans
  • Malformed Packets
  • Laboratory Exercises and Case Studies

Requirements

A solid understanding of the TCP/IP protocol stack is required, along with completion of the "Basic Network Troubleshooting Using Wireshark" course or equivalent knowledge. Participants must bring their own laptops with Wireshark installed (available as a free download from www.wireshark.org).

 21 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories