
Analysis of Network Applications and User Traffic. Extending the Power of Wireshark 3.0 – Regular. Using Wireshark 3.0 Standard Display Filtering. Show me the Money! – Display Filters and Regular Expressions. Building a Baseline Library – Where Do I go to Find Samples?. The 6 Key Statistical Displays to Master. Analyzing Conversations and Activities UsingĮxpert Systems to Determine Unusual Activity. Expert Analysis – Introduction to Statistical Analysis and Graphing. The Importance of Effectively Using Time Values. My Network is Slow! – Using Wireshark 3.0 to Effectively Trouble. Constructing, Using and Interpreting Color Rues. Answering the key questions – A Sample Network. 6 Steps for practical Network Analysis of suspicious. Effectively Navigating Wireshark 3.0 and Interpreting Color. Analyzing the Data – A Sample Network Analysis. Hubs, Switches, Bridges, Routers, Firewalls. Location – How Network Infrastructure Devices. Fine-Tuning Wireshark 3.0 – Advanced Wireshark Profile Optimization. Using capture filters to capture specific suspect traffic. Building and optimizing configuration Profiles for data capture. Network analysis challenges – Nomenclature and Terminology for Wireshark. Attendees will receive a student guide including numerous reference files and networking and forensics tools, as well as a library of reference documents. Real-World examples will be utilized throughout the course in conjunction with numerous hands-on exercises to provide field proven, practical analysis skills. – Specialized filtering and Analysis techniques including data traffic reconstruction and viewing – Behavior, analysis and threat recognition for a number of the standard user version 4 protocols including IP, DHCP, TCP, UDP, DNS, ICMP, ARP and common Internet based User Protocols such as HTTP / HTTP 2.0 / NNTP
– Specialized software configuration and packet capture techniques using Wireshark 3.0 This course will provide the student with a set of investigate and analysis techniques focusing on the use of vendor-neutral, Open-Source Tools such as Wireshark to provide insight into the following areas: Effective Network analysis and Optimization encompasses the skills of not only capturing data, but also the ability to discern the key patterns hidden within the flood of network traffic.