Mastering Wireshark (CS8516)

Wireshark, a combination of a Linux distro (Kali) and an open source security framework (Metasploit), is a popular and powerful tool. Wireshark is mainly used to analyze the bits and bytes that flow through a network. It efficiently deals with the second to the seventh layer of network protocols, and the analysis made is presented in a form that can be easily read by people.

Mastering Wireshark 2 helps you gain expertise in securing your network. We start with installing and setting up Wireshark2.0, and then explore its interface in order to understand all of its functionalities. As you progress through the chapters, you will discover different ways to create, use, capture, and display filters. By halfway through the course, you will have mastered Wireshark features, analyzed different layers of the network protocol, and searched for anomalies. You’ll learn about plugins and APIs in depth. Finally, the course focuses on pocket analysis for security tasks, command-line utilities, and tools that manage trace files.

By the end of the course, you'll have learned how to use Wireshark for network security analysis and configured it for troubleshooting purposes.

A preferential rate (-15%) applies to the regular cost for non-profit organizations, as well as the government sector. In addition, you can benefit from additional advantages through a corporate agreement when you need to train several people or teams in your company. Contact us for details.

Public class

5 days / 35 hours

Private class

On site / Virtual classroom
Minimum no. of participants: 4
5 days / 35 hours
Price on request
English or Serbian
Training plan: 

Module 1: Installing Wireshark 2

  • Installation and setup

 Module 2: Getting Started with Wireshark

  • What's new in Wireshark 2?
  • Capturing traffic
  • Saving and exporting packets
  • Annotating and printing packets
  • Remote capture setup
  • Remote capture usage

 Module 3: Filtering Traffic

  • Berkeley Packet Filter (BPF) syntax
  • Capturing filters
  • Displaying filters
  • Following streams
  • Advanced filtering

 Module 4: Customizing Wireshark

  • Preferences
  • Profiles
  • Colorizing traffic

 Module 5: Statistics

  • TCP/IP overview
  • Time values and summaries
  • Trace file statistics
  • Expert system usage

 Module 6: Introductory Analysis

  • DNS analysis
  • ARP analysis
  • IPv4 and IPv6 analysis
  • ICMP analysis

 Module 7: Network Protocol Analysis

  • UDP analysis
  • TCP analysis I
  • TCP analysis II
  • Graph I/O rates and TCP trends

 Module 8: Application Protocol Analysis I

  • DHCP analysis
  • HTTP analysis I
  • HTTP analysis II
  • FTP analysis

 Module 9: Application Protocol Analysis II

  • Email analysis
  • 802.11 analysis
  • VoIP analysis
  • VoIP playback

 Module 10: Command-Line Tools

  • Running Wireshark from a command line
  • Running tshark
  • Running tcpdump
  • Running dumpcap

 Module 11: A Troubleshooting Scenario

  • Wireshark plugins
  • Determining where to capture
  • Capturing scenario traffic
  • Diagnosing scenario traffic
  • One year access to the class recording
  • Access to the lab environment during the training
  • Course material accessible in electronic format
  • One year subscription to the CodeRed platform containing thousands of cybersecurity videos
  • Certificate of attendance

Contact us for more information on pricing::

Office: 1-888-718-9732
E-mail: info@eccentrix.ca

130, King Street West, Suite 1800
Toronto, Ontario M5X 1E3