This plan includes
- Limited free courses access
- Play & Pause Course Videos
- Video Recorded Lectures
- Learn on Mobile/PC/Tablet
- Quizzes and Real Projects
- Lifetime Course Certificate
- Email & Chat Support
What you'll learn?
- you'll learn wireshark with real time examples
- OSI layers with detailed analysis using wireshark latest tactics
- land your dream job as a soc analyst and network analyst
- in this course you'll learn latest cyber threats with wireshark
Course Overview
Hi Techies..!
Welcome to the Wireshark Essentials from SiemHunters. This course that has potential to change your Professional life into defense side cyber security domain. this course made from our industrial cyber security expert Mr. Gopi Pakanati and Instructor Ramya Sri Pachala.
In this course content helps to level up your skills in Cyber threats, wireshark filters, kali linux, and latest password attacks and sniffing concepts, you'll understand osi layers with detailed explanations.
Course Outline:
Complete Kali Linux Commands-Line: To understand the how attackers execute offensive commands in your infra to gain unauthorized access.
Advanced Cyber Threats: To understand latest threats, and attacks in modern attack surface.
Wireshark deployment : wireshark installation and configurations
Working with Wireshark: understand filters, and sniff traffic between unencrypted channels
Suspicious detection: investigate suspicious and unauthorized downloads in your organization.
Detecting passwords: sniff traffic using unencrypted channels and analyze password attempts
Troubleshoot Network issues: understand network trouble shooting
-Packet anaslysis: Analyze packets, Detect different Network threats / attacks and Optimize Wireshark to increase productivity .
This Course designed for:
-
New fresher graduates in cyber security or other fields
-
who explore cyber security to become a cyber expert
-
Cyber security Analyst
-
Security Analyst
-
Cyber Security Managers
-
Qualys guard VM based reports
-
IT Professionals
All the best techies..!
Pre-requisites
- No prior experience needed, You will learn from basic networking, kali linux, and wireshark latest filters
Target Audience
- Network administrators
- Ethical Hackers
- SOC analyst
- penetration testers
- soc professionals
Curriculum 64 Lectures 07:05:34
Section 1 : Complete Kali Linux commands for Secops
- Lecture 2 :
- Directories in Kali Linux
- Lecture 3 :
- Services in Kali Linux
- Lecture 4 :
- Servers in kali Linux
- Lecture 5 :
- Users management
- Lecture 6 :
- Cat Command
- Lecture 7 :
- CD command
- Lecture 8 :
- cmp diff command
- Lecture 9 :
- cp command
- Lecture 10 :
- egrep command
- Lecture 11 :
- File permissions
- Lecture 12 :
- Find command
- Lecture 13 :
- Find files by names command
- Lecture 14 :
- Find files by type and perm
- Lecture 15 :
- grep command
- Lecture 16 :
- ls command (List)
- Lecture 17 :
- Mkdir command (make the directory)
- Lecture 18 :
- Modes command
- Lecture 19 :
- rm command (to remove the files)
- Lecture 20 :
- Sort command
- Lecture 21 :
- touch command
- Lecture 22 :
- Uname command
- Lecture 23 :
- uniq command
- Lecture 24 :
- Users_last command
- Lecture 25 :
- w command
- Lecture 26 :
- wc command (word count)
- Lecture 27 :
- who-is-logged command
- Lecture 28 :
- who command
Section 2 : Working with Wireshark
- Lecture 1 :
- Wireshark installation
- Lecture 2 :
- Wireshark features
- Lecture 3 :
- Working with Wireshark
- Lecture 4 :
- Useful filters
- Lecture 5 :
- Regular expressions - 1
- Lecture 6 :
- Regular expressions - 2
- Lecture 7 :
- packet colorization
- Lecture 8 :
- Hex values
Section 3 : OSI Layers - Practical
- Lecture 1 :
- Physical Layer
- Lecture 2 :
- Data Link Layer
- Lecture 3 :
- Network Layer
- Lecture 4 :
- Transport Layer
- Lecture 5 :
- Presentation Layer
- Lecture 6 :
- Application layer
Section 4 : Investigating threats using wireshark
- Lecture 1 :
- ICMP ping-sweep - Understanding
- Lecture 2 :
- ICMP ping-sweep - Practical
- Lecture 3 :
- Wifi packet analysis
- Lecture 4 :
- TCP Reverse Shell detection
- Lecture 5 :
- Performing registry entry monitoring
- Lecture 6 :
- TCP Handshake
- Lecture 7 :
- Startup program monitoring
- Lecture 8 :
- Stealth Scan
- Lecture 9 :
- NMAP Null Scan
- Lecture 10 :
- HTTP - steal credentials from unencrypted channel
- Lecture 11 :
- HTTP Tunneling
- Lecture 12 :
- FTP - Dictionary attack
- Lecture 13 :
- FTP - capture passwords
- Lecture 14 :
- DOS Attack
- Lecture 15 :
- ARP - Address resolution Protocol (detecting ARP packets)
- Lecture 16 :
- Detecting ARP Attacks
- Lecture 17 :
- Detecting ARP attacks switch based
- Lecture 18 :
- DOS attack - Offensive
- Lecture 19 :
- Detecting Suspicious downloads/objects
- Lecture 20 :
- Man in the middle attack - 1
- Lecture 21 :
- Man in the middle attack - 1
Our learners work at
Frequently Asked Questions
How do i access the course after purchase?
It's simple. When you sign up, you'll immediately have unlimited viewing of thousands of expert courses, paths to guide your learning, tools to measure your skills and hands-on resources like exercise files. There’s no limit on what you can learn and you can cancel at any time.Are these video based online self-learning courses?
Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic.Can i play & pause the course as per my convenience?
Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on.How do i contact the instructor for any doubts or questions?
Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want.Do i need a pc to access the course or can i do it on mobile & tablet as well?
Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly.Do i get any certificate for the courses?
Yes. Once you complete any course on our platform along with provided assessments by the instructor, you will be eligble to get certificate of course completion.For how long can i access my course on the platform?
You require an active subscription to access courses on our platform. If your subscription is active, you can access any course on our platform with no restrictions.Is there any free trial?
Currently, we do not offer any free trial.Can i cancel anytime?
Yes, you can cancel your subscription at any time. Your subscription will auto-renew until you cancel, but why would you want to?
Instructor
3480 Course Views
4 Courses