Wireshark: Malware and Forensics
Posted by Superadmin on May 14 2020 04:38:29

Wireshark: Malware and Forensics

with Lisa Bock


01_01-Welcome



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


01_02-What you should know



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


02_01-Cyberattacks and trends



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


02_02-Malware and compromised systems



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


02_03-Packet analysis overview



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


02_04-Wireshark overview



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


02_05-Tshark



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


02_06-Tap into your network



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


02_07-Create firewall rules



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


03_01-Baseline your network



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


03_02-Display filters



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


03_03-Capture filters



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


03_04-Statistics



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


03_05-Save, export, and print



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


03_06-Coloring rules



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


03_07-Using a ring buffer



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


03_08-Challenge_ HTTP packets



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


03_09-Solution_ HTTP packets



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


04_01-OSI layer attacks



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


04_02-Indications of compromise



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


04_03-Ports related to malicious activity



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


04_04-Attack signatures



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


04_05-Using VirusTotal



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


04_06-Challenge_ Analyze



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


04_07-Solution_ Analyze



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


05_01-Fast flux DNS



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


05_02-Trojan in the house



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


05_03-Unwanted TOR activity



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


05_04-Challenge_ Packets and filters



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


05_05-Solution_ Packets and filters



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


06_01-Next steps



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files

Wireshark: Malware and Forensics

with Lisa Bock


Ex_Files_Wireshark_Malware.zip



Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

      
Course Contents
01. Introduction 02. Deep Packet Analysis 03. Capture Overview 04. Unusual Traffic 05. Case Studies 06. Conclusion Exercice Files