About this video

Wireshark is the world's foremost and most widely-used network protocol analyzer. It lets you see what's happening on your network at a microscopic level. Wireshark deals with the second to the seventh layers of network protocols, and the analysis made is presented in a human-readable form. It is used for network troubleshooting, analysis, software, and communications protocol development.

This course starts setting up a Wireshark lab in the Windows and Linux operating systems. We dive into the overall process of packet capturing and Wireshark filters. Then, we introduce tshark, a command line-version of Wireshark, and we learn about various tshark commands. Later, we are introduced to various types of network cyber attack and essential remedies. We also go through an array of techniques to monitor and secure these attacks using Wireshark. Lastly, we cover network troubleshooting using Wireshark.

Towards the end of the course, you'll use Wireshark efficiently to find primary sources of network performance problems and also different ways to secure networks.

Style and Approach

This course aims to provide complete coverage of every objective in Wireshark. The course is filled with apt and concise demonstrations and explanations to help you to understand Wireshark and its uses.

Publication date:
January 2019
2 hours 35 minutes

About the Author

  • Sunil Gupta

    Sunil Gupta is an experienced computer programmer and cybersecurity expert and consults in Information Technology with a focus on cybersecurity. He is an invited speaker for, and a member of, many key organizations. Sunil has helped many organizations around the Globe, including Barclays Bank; Aviation College Qatar (QATAR); Ethiopian Airlines; Telecom Authority Tanzania; NCB Bank (Saudi Arabia); Accenture (India); Afghan Wireless (Afghanistan); and many more. Currently, he teaches online over 60,000 students in more than 170 countries and some of his best work has been published by major publishing houses. Some of his best courses include: End-to-End Penetration Testing with Kali Linux and Threat and Vulnerability Assessment for Enterprises. His cybersecurity certifications include SSCP Certification (Systems Security Certified Practitioner), Bug Bounty Program Certification, and more. https://www.linkedin.com/in/sunilguptaethicalhacker/

    Browse publications by this author
Book Title
Unlock this video and the full library for FREE
Start free trial