Troubleshooting Slow Network with Wireshark
Troubleshooting Slow Network with Wireshark
Intermediate
10 Hrs
Wireshark Advanced Usage for Troubleshooting
Wireshark Advanced Usage for Troubleshooting
Overview
Wireshark is a free and open-source network traffic analyzer. Compared to other tools, Wireshark enables users to examine network packets at a much deeper level. The analysis capabilities that Wireshark offers, which give a thorough understanding of the traffic, are what give it its true strength. It is used to troubleshoot network issues such as slow web servers and analyze HTTP traffic. Cybersecurity professionals often use Wireshark to trace connections, view the contents of suspect network transactions, and find bursts of network traffic.
The course begins with learning the basics of Wireshark and WinPcap on the Windows platform. As you move on, you will learn to create a capture from a live network and use it to prove the importance of filtering in Wireshark. Further, you will explore expression tools to filter down example capture and examine a potential issue with the traffic. Next, you will learn to analyze a capture by viewing, filtering, and examining each network protocol layer. Subsequently, you will learn graph functions, time delays, and network problems. Next, you will learn the comparison between different capture techniques. Finally, you will have the ability to create your filtering codes by using the most efficient, fast, and easiest way on Wireshark. Thus, creating the exact true filtering code will not be trouble for you anymore. Further, you will learn to troubleshoot specific problems by checking TCP errors and finding invalid retransmissions.
By the end of the course, you will master the technique to find errors in proprietary protocol and implement them by solving them successfully.
What You Will Learn
- Familiarize with network analysis process and the key points of an effective network traffic
- Understand about deep packet captures (PCAP) inspection and investigating of network traffic
- Learn about advanced features of the Wireshark by focusing on packet-level details.
- Detecting suspicious or malware infection activities and anomalies on the network such as unauthorized remote communications, Nmap Scans, ARP poisoning, and MITM attacks, etc.
- Learn how to decrypt encrypted traffic and analyze traffic activity.
- Understand about various filtering methods and create filtering codes in different ways
Prerequisites
- Basic Understanding of Networking Concepts
- A computer system with at least the following: 4-bit AMD64/x86-64 or 32-bit x86 CPU architecture.
- At least 500 MB available RAM. Larger capture files require more RAM.
- At least 500 MB of available disk space.
- The capture files require extra disk space, it requires a minimum resolution of 1280 × 1024 or higher.
Content
Chapter 1: Understanding of Network Traffic Analysis
4 Videos
Why Do We Need to Perform Network Traffic Analysis? Understanding the NTA Processes OSI / TCP-IP Models Knowledge $7 Million Cybersecurity Scholarship by EC-Council Chapter 1 Quiz
Preview
Chapter 2: The Basics of Wireshark
3 Videos
Downloading and Installing Wireshark for Traffic Analysis Wireshark GUI Walkthrough The Features and Advantages of the Wireshark Application Chapter 2 Quiz
Preview
Chapter 3: Capturing the Network Traffic and Making Analysis
3 Videos
Different Capture Techniques Wireshark Interface and OSI Model Network Traffic Analysis in Practice Chapter 3 Quiz
Preview
Chapter 4: Filtering Packets and Packet Dissection
4 Videos
Filtering Techniques Protocol Details and Analysis Finding and Coloring Packets Exporting Objects Chapter 4 Quiz
Preview
Chapter 5: Discovery of Malicious Activities on the Network
3 Videos
Discovery of Nmap Scans Discovery of ARP Poisoning and MITM Attacks Investigating the Anomalous Packets -DNS and ICMP Tunneling Chapter 5 Quiz
Preview
Chapter 6: Protocol-Based Analysis- Cleartext Protocol Analysis
4 Videos
TCP Analysis -Three-Way Handshake Identifying Hosts: DHCP, NetBIOS, and Kerberos FTP Analysis HTTP Analysis - Log4j Attacks Chapter 6 Quiz
Preview
Chapter 7: Encrypted Protocol Analysis
3 Videos
SSL/TLS Protocols and TLS Handshake Decrypting HTTPS Traffic Decrypting RDP Traffic Chapter 7 Quiz
Preview
Chapter 8: Path MTU Discovery
2 Videos
IP Fragmentation and Reassembly Path MTU Discovery with Wireshark Chapter 8 Quiz
Preview
Chapter 9: Conclusion
1 Videos
Conclusion
Preview
This course is part of a learning path
1083 enrollments
Course
Troubleshooting Slow Network with Wireshark
$49.99
career path
Becoming a Network Management and Security Specialist
Becoming a Network Management and Security Specialist Without Spending a Fortune on Your Training!
Instructor
Hüseyin Yaraş
Get access to only this course
$49.99
One-time PaymentGet access to all 500+ courses with EC-Council Pro
$59.99/Month
Get access to all 500+ courses with EC-Council Pro
$599/Year
Get 2 months free!
Looking to train your team?
Try EC-Council Enterprise »Reviews
(163 reviews)
5
Average Course Rating
Related Courses
469 enrollments
Course
CCNA - Understanding Routers and Switches
$49.99
231 enrollments
Course
CISSP Certification Domains 5, 6, 7, and 8 Video Training
$69.99
809 enrollments
Course
Learn Ethical Hacking by Hacking Real Websites Legally
$69.99