Lynda - Troubleshooting Your Network with Wireshark

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size470.7 MB
  • Uploaded Bysumi1
  • Downloads2085
  • Last checkedApr. 21st '18
  • Date uploadedJul. 25th '17
  • Seeders 15
  • Leechers3

Infohash : 48B41486FF900A120772F6B4F00443A60CB9CF11

Learn how to capture and analyze network traffic with Wireshark, a free, open-source packet analysis tool, and identify congestion issues, suspicious activity, and network intrusions. In this course, Lisa Bock reviews the fundamental concepts underlying Wireshark, such as network analysis and the OSI model, and examines some example packet captures so you can start to understand field values and compare normal to abnormal network behaviors. You'll also be introduced to common attack signatures, display and capture filters, and protocols such as HTTP, TCP, DNS, and FTP.
Topics include:
Exploring the Wireshark interface
Using display and capture filters
Dissecting the OSI model
Analyzing TCP, IPv4, and other protocols
Detecting denial-of-service attacks and password attacks
Using security tools for ethical hacking

Files:

Lynda - Troubleshooting Your Network with Wireshark 00. Introduction
  • 00_01 - Welcome.mp4 (22.0 MB)
  • 00_02 - What you should know.mp4 (1.8 MB)
  • 00_03 - Download and install Wireshark.mp4 (9.7 MB)
  • 00_04 - Downloading the exercise files.mp4 (9.8 MB)
  • 00_05 - Challenges explained.mp4 (4.2 MB)
01. Traffic Capture and Analysis
  • 01_01 - Traffic capture overview.mp4 (6.4 MB)
  • 01_02 - Exploring the Wireshark interface.mp4 (20.2 MB)
  • 01_03 - Managing capture options.mp4 (9.4 MB)
  • 01_04 - Using display and capture filters.mp4 (18.9 MB)
  • 01_05 - Challenge Filtering the data that is displayed.mp4 (2.1 MB)
  • 01_06 - Solution Filtering the data that is displayed.mp4 (10.9 MB)
02. Review of the Open Systems Interconnection (OSI) Model
  • 02_01 - Dissecting the OSI model.mp4 (8.3 MB)
  • 02_02 - Diving deeper into the layers of the OSI model.mp4 (11.4 MB)
  • 02_03 - Understanding encapsulation.mp4 (23.9 MB)
03. Deep Packet Analysis of Common Protocols
  • 03_01 - Analyzing TCP.mp4 (12.4 MB)
  • 03_02 - Dissecting the TCP three-way handshake.mp4 (18.8 MB)
  • 03_03 - Exploring IPv4.mp4 (16.8 MB)
  • 03_04 - Discovering HTTP.mp4 (18.7 MB)
  • 03_05 - Mastering DNS.mp4 (17.9 MB)
  • 03_06 - Grasping UDP.mp4 (19.8 MB)
  • 03_07 - Examining FTP.mp4 (21.8 MB)
  • 03_08 - Dissecting ICMP.mp4 (30.9 MB)
  • 03_09 - Challenge Protocol discovery.mp4 (4.4 MB)
  • 03_10 - Solution Protocol discovery.mp4 (20.0 MB)
04. Normal and Abnormal Behavior
  • 04_01 - Displaying Wireshark's expert system.mp4 (10.9 MB)
  • 04_02 - Navigating TCP transmission errors.mp4 (19.7 MB)
05. Common Attack Signatures
  • 05_01 - Detecting denial-of-service attacks.mp4 (14.0 MB)
  • 05_02 - Challenge Identifying attack signatures.mp4 (2.0 MB)
  • 05_03 - Solution Identifying attack signatures.mp4 (6.2 MB)
  • 05_04 - Identifying network scans.mp4 (7.6 MB)
  • 05_05 - Distinguishing ARP issues from attacks.mp4 (15.8 MB)
  • 05_06 - Protecting from password attacks.mp4 (8.4 MB)
  • 05_07 - Examining macof attacks.mp4 (19.6 MB)
06. Security Tools
  • 06_01 - Understanding passive and active attacks.mp4 (13.7 MB)
  • 06_02 - Using security tools for ethical hacking.mp4 (10.0 MB)
  • 07_01 - Next steps.mp4 (1.6 MB)
  • Ex_Files_Wireshark.zip (857.0 KB)
  • Torrent Downloaded From Katcr.co - Kickasstorrents.txt (0.1 KB)

Code:

  • udp://tracker.opentrackr.org:1337/announce
  • udp://p4p.arenabg.com:1337/announce
  • udp://tracker.zer0day.to:1337/announce
  • udp://tracker.coppersurfer.tk:6969/announce
  • udp://eddie4.nl:6969/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://tracker.leechers-paradise.org:6969/announce
  • udp://tracker.coppersurfer.tk:6969
  • udp://tracker.grepler.com:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://shadowshq.yi.org:6969/announce