Mastering Wireshark 2 Online Course
Wireshark is one of the most widely used tools for analyzing network traffic, offering deep visibility into the flow of data across layers 2 through 7 of the OSI model. It translates complex network protocols into a human-readable format, making network analysis accessible and actionable.
In this course, you'll develop advanced skills in using Wireshark 3 to secure and troubleshoot your network. We begin by walking you through the installation process and familiarizing you with the interface so you can navigate its features with confidence. You'll then explore how to create and apply capture and display filters to focus your analysis on relevant traffic.
As you progress, you'll dive into advanced capabilities—examining the different layers of network protocols, identifying anomalies, and utilizing plugins and APIs to extend Wireshark’s functionality. By the second half of the course, you'll be proficient in interpreting captured traffic and leveraging Wireshark for deeper insight into network behavior.
In the final section, you'll learn to use Wireshark for network security analysis and configure it for effective troubleshooting, empowering you to proactively detect and address network issues.
Who Is This Course For?
This course is intended for IT professionals, network analysts, and security enthusiasts who have a solid understanding of the OSI and TCP/IP models. Familiarity with Wireshark is expected, and Python knowledge is required to work with PyShark, the Python wrapper for Wireshark. The course is ideal for those looking to deepen their network analysis skills and apply Wireshark in real-world security and troubleshooting scenarios.
Course Curriculum
Customization of Wireshark
- The Course Overview
- Installation and Customization
- Preferences and Profiles
- Overview of GUI
- Colorizing Traffic
- Wireshark Requirements and Platforms
Using Wireshark for Capturing and Examining Traffic
- Sources of Packet Captures
- Capturing Packets
- View Settings and Saving Packet Captures
- Capture Filters
- Time Values and Summaries
- Trace File Statistics
- Expert System Usage
Examining and Analyzing Traffic Analysis
- Display Filters
- Display Filter Macros
- Display Filter Expression
- Conversation Filter
- Exporting Captures
Analyzing Network Protocols
- Follow Protocol Streams
- Reviewing Statistics
- Telephony and Wireless
- UDP Overview and Analysis
- TCP Overview and Analysis
- Graph I/O Rates and TCP Trends
- Analyzing Application Protocols
- DHCP Analysis
- HTTP Analysis
- FTP Analysis
- VoIP Analysis
- Sample Traffic Captures
Wireshark Command-Line Tools
- Why Use the Command-Line
- Wireshark from Command-Line
- Running TShark
- Running Dumpcap
- Running TShark with PowerShell
Expanding and Troubleshooting Wireshark
- Choosing What to Capture
- Capture Scenario
- Analyzing Scenario Traffic
- Capturing Options
- Optional Plugins
Expanding Wireshark
- Using Mirror (SPAN) Ports on Cisco Devices
- Prerequisites for Cisco Packet Capture
- Using Cisco Packet Capture
- Wireshark Plugins and API
- Analyzing Networking Traffic Using the PyShark Library