Wireshark for Packet Analysis and Ethical Hacking Online Course
Wireshark for Packet Analysis and Ethical Hacking Online Course
Wireshark for Packet Analysis and Ethical Hacking Online Course
About the Course
Master Wireshark through hands-on learning. This course includes practical exercises with provided .pcapng files so you can follow along and apply your skills in real-time.
Here’s what you’ll learn:
Capture credentials from Telnet, FTP, TFTP, and HTTP traffic
Replay VoIP conversations
Extract OSPF authentication passwords
Troubleshoot and analyze real network issues
The course focuses on practical application—teaching you how to analyze, interpret, and inspect network traffic using Wireshark for its core purpose: deep packet analysis and network troubleshooting.
Additionally, you’ll explore how to ethically hack and examine common network protocols like DTP, VTP, STP, and DHCP using Kali Linux tools—enhancing your understanding of both offensive and defensive network security.
Who should take this Course?
The Wireshark for Packet Analysis and Ethical Hacking Online Course is ideal for network administrators, cybersecurity professionals, ethical hackers, and IT support staff who want to gain hands-on skills in monitoring, analyzing, and troubleshooting network traffic. It’s also suitable for students and beginners in cybersecurity looking to understand how data travels across networks and how to detect potential threats. Basic knowledge of networking concepts and protocols is recommended for effective learning.
Course Curriculum
Introduction
Introduction
Wireshark Installation: Windows
Wireshark Installation: Mac OS
Wireshark Basics
The best way to learn!
Capture frames / packets / segments
Why are no packets captured?
Port SPAN / Mirroring
OSI Model
OSI Model - Part 1 - OSI Model Introduction
OSI Model - Part 2 - OSI Model Layers
OSI Model - Part 3 - Split of concentration
OSI Model - Part 4 - Layer 7 Application Layer
OSI Model - Part 5 - Layer 6 Presentation Layer
OSI Model - Part 6 - Layer 5 Session Layer
OSI Model - Part 7 - Top layers versus lower layers
OSI Model - Part 8 - Transport Layer
OSI Model - Part 9 - Network Layer
OSI Model - Part 10 - Data Link Layer
OSI Model - Part 11 - Physical Layer
OSI Model - Part 12 - Host Communication
OSI Model - Part 13 - Encapsulation
OSI Model - Part 14 - TCPIP versus OSI Model
Wireshark Filters
Wireshark Display filters
Practical Demonstration of Wireshark Display filters
Two types of filters
Wireshark Capture Filters
Wireshark Filters: IP address / protocols
Wireshark: Hacking Passwords
Telnet Password & Data Captures
TFTP Password & Data Capture
FTP Password & Data Capture
HTTP Data Capture
Cisco router HTTP Password Capture
Hacking VoIP
Replay Voice over IP calls (Virtual IP Phones)
Capture and replay voice calls (Virtual & Physical IP Phones)
Protocol Analysis: Can you troubleshoot the network
DTP Lab: Quiz
DTP Lab: Answers
CDP, LLDP Lab: Quiz
CDP, LLDP Lab: Answers
OSPF Lab: Quiz
OSPF Lab: Answers Part 1
OSPF Lab: Answers Part 2
OSPF Troubleshooting Lab 1: Question
OSPF Troubleshooting Lab 1: Answers
OSPF Troubleshooting Lab 2: Question
OSPF Troubleshooting Lab 2: Answers
OSPF Troubleshooting Lab 3: Question
OSPF Troubleshooting Lab 3: Answers
EIGRP Lab: Questions
EIGRP Lab: Answers
EIGRP Troubleshooting Lab 1: Question
EIGRP Troubleshooting Lab 1: Answers
EIGRP Troubleshooting Lab 2: Question
EIGRP Troubleshooting Lab 2: Answers
BGP Lab: Question
BGP Lab: Answers
BGP Troubleshooting Lab: Question
BGP Troubleshooting Lab: Answers
Wireshark Tips and Tricks
Quick Wireshark Filters
Wireshark Profiles
Wireshark Conversation Filters
Wireshark Statistics
Wireshark Protocol Hierarchy
Wireshark Conversations and IO Graph
Wireshark Flow Graph
tshark and Termshark
Overview and tshark install and packet capture
Termshark
Python Wireshark scripting
tshark and Pyshark installation
Basic Pyshark testing
Pyshark script
Python Wireshark Password Captures
Lab overview and setup
iPython and interactive OSPF script
OSPF Password Python script
FTP Password Capture Python script
Telnet Password Capture Python Script
Kali Linux: Installation
Import Kali Linux (Windows 10 / VirtualBox)
Kali Linux: Network Attack Demonstrations
Network Overview
DTP Attack Demo
VTP Attack Demo Part 1
VTP Attack Demo Part 2
Spanning Tree Attack Demo
Demo: Mitigation of attacks
Kali Linux: DHCP attacks and Man-in-the-middle attack