Identify Common Cyber Network Attacks with Wireshark
Offered By: Pluralsight
Course Description
Overview
This course will teach you how to quickly spot cyber attacks and indicators of compromise in network traffic with Wireshark.
Cyber attacks are everywhere. Are they lurking in your network? Every IT professional needs to develop the skills with Wireshark to quickly spot them. In this course, Identify Common Cyber Network Attacks with Wireshark, you’ll gain the ability to threat hunt at the packet level. First, you’ll explore how network and OS Fingerprinting scans work and how to identify them. Next, you’ll discover how to spot indicators of compromise in malware infections. Finally, you’ll learn how to isolate botnet and data exfiltration traffic. When you’re finished with this course, you’ll have the skills and knowledge of threat hunting with Wireshark needed to identify common cyber network attacks on your network.
Cyber attacks are everywhere. Are they lurking in your network? Every IT professional needs to develop the skills with Wireshark to quickly spot them. In this course, Identify Common Cyber Network Attacks with Wireshark, you’ll gain the ability to threat hunt at the packet level. First, you’ll explore how network and OS Fingerprinting scans work and how to identify them. Next, you’ll discover how to spot indicators of compromise in malware infections. Finally, you’ll learn how to isolate botnet and data exfiltration traffic. When you’re finished with this course, you’ll have the skills and knowledge of threat hunting with Wireshark needed to identify common cyber network attacks on your network.
Syllabus
- Course Overview 1min
- When to Break Out Wireshark for Threat Hunting 8mins
- Analyzing Port Scans and Enumeration Methods 55mins
- Analyzing Common Attack Signatures of Suspect Traffic 39mins
- Identifying Common Malware Behavior 18mins
- Identify Shell, Reverse Shell, Botnet, and DDoS Attack Traffic 31mins
Taught by
Chris Greer
Related Courses
Python for Command-and-control, Exfiltration and ImpactInfosec via Coursera Cisco Core Security: Secure Network Access, Visibility, and Enforcement
Pluralsight Ethical Hacking: SQL Injection
Pluralsight Exfiltration with Dnscat2
Pluralsight Network Analysis with Arkime
Pluralsight