Learn how to capture and analyze network traffic with Wireshark, a free, open-source packet analysis tool, and identify congestion issues, suspicious activity, and network intrusions. In this course, Lisa Bock reviews the fundamental concepts underlying Wireshark, such as network analysis and the OSI model, and examines some example packet captures so you can start to understand field values and compare normal to abnormal network behaviors. You'll also be introduced to common attack signatures, display and capture filters, and protocols such as HTTP, TCP, DNS, and FTP.
Author - Ethical Hacking: Penetration Testing
Since 2004, Lisa Bock has been teaching IT, everything from forensics to network security.
Lisa is an associate professor in the Information Technology department at Pennsylvania College of Technology, in Williamsport, PA. Courses she has taught during the past 13 years include: networking, security, biometrics, technical support, protocol vulnerabilities (using Wireshark), CCNA Security, and VoIP and Unified Communications. She holds an MS from University of Maryland University College (UMUC) along with numerous other certifications. She has had training in forensics, networking, steganography, and network security. She is involved with various volunteer activities, has evaluated professional journals, and is an award-winning speaker. Lisa and her husband Mike enjoy bike riding, watching movies, and traveling.
- Since 2004, Lisa Bock has been teaching IT, everything from forensics to network security.
Skills covered in this course
- Hello, I'm Lisa Bock, and welcome to Troubleshooting Your Network with Wireshark. In this course we will capture and analyze network traffic using Wireshark, a free and open source packet analysis tool. Network packet analysis is important in order to troubleshoot congestion issues, create firewall and intrusion detection system rules, and perform incident and threat detection. The course will review fundamental concepts, beginning with an overview of network analysis and the OSI model in order to better understand the various elements of a packet. You will examine packet captures and understand the field values of the protocols and what is considered normal behavior. We will then look at abnormal behavior and attax signatures and examine some common security tools. We will immerse ourselves in Wireshark to look at basic features such as display and capture filters, and become more comfortable with common protocols such as TCP, HTTP, DNS, and FTP. All of which I am truly excited to…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Download the exercise files for this course. Get started with a free trial today.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Watch this course anytime, anywhere. Get started with a free trial today.