Course Overview
  • Introduction
Course Setup: First Steps of Protocol Analysis
  • Download and Install Wireshark
  • Work with Wireshark
  • Review the First Packet capture in Wireshark.
Network Communication at the Packet Level
  • Introduction
  • Analyze Client to Server Communication with the Wireshark User Interface.
  • Lecture 6 updated
  • Your first protocols
  • Examine protocol packets within the Wireshark tool.
  • Network communication quiz
TCP/IP Foundation
  • Introduction
  • Protocol Analysis at the network level using Wireshark
  • Interpreting Connections and Protocols
  • Intermediate Protocol Analysis of static captures using Wireshark.
  • TCP/IP Foundation Quiz
Starting your First Capture
  • Introduction
  • Live capture exercise
  • Analyzing the live capture using Wireshark.
Working with Capture Files in Wireshark
  • Introduction
  • Saving the capture to a file
  • Advanced Capture Methods
  • Advanced Capture Scenario Analysis Methods With Wireshark.
  • Working with capture files within Wireshark
Analyzing Packet Captures
  • Introduction
  • Creating Wireshark filters
Examining Protocol Communication
  • Introduction
  • Attacking the network communication and identifying artifacts with Wireshark
  • Applying your skills to identify potential incidents within Wireshark captures
Bonus Capture Files
  • Bonus-File1 capture file
  • Bonus-File1 Solution
  • Bonus File2 capture File
  • Bonus-File2 Solution
Section 10: The Steps of Professional Hacking
  • The first step of professional hacking scanning methodology!
  • The second step of the professional hacking methodology
  • The third step of the professional hacking methodology
  • The fourth step of the professional hacking methodology
  • The fifth step of the professional hacking methodology
  • The sixth step of the professional hacking methodology
  • Working with Malware Capture Files
  • Lecture 35: File extraction using Wireshark