Wireshark Configuration for Cyber Security Analysis
Offered By: Pluralsight
Course Description
Overview
This course will teach you the best settings and filters to use in Wireshark for quickly spotting malware behavior, enumeration and scans, and other suspect traffic.
Properly configuring Wireshark can greatly help to track down IoCs and can reduce the time required for Cyber Security professionals to perform network forensics. In this course, Wireshark Configuration for Cyber Security Analysis, you’ll learn to quickly spot suspect traffic with Wireshark. First, you’ll explore the top five Wireshark settings that all Security Professionals should implement when analyzing traffic. Next, you’ll discover how to create filters and coloring rules that will make suspect traffic stand out. Finally, you’ll learn how to decrypt TLS traffic for analyzing secure communications. When you’re finished with this course, you’ll have the skills and knowledge of Wireshark needed to speed up traffic analysis and incident response.
Properly configuring Wireshark can greatly help to track down IoCs and can reduce the time required for Cyber Security professionals to perform network forensics. In this course, Wireshark Configuration for Cyber Security Analysis, you’ll learn to quickly spot suspect traffic with Wireshark. First, you’ll explore the top five Wireshark settings that all Security Professionals should implement when analyzing traffic. Next, you’ll discover how to create filters and coloring rules that will make suspect traffic stand out. Finally, you’ll learn how to decrypt TLS traffic for analyzing secure communications. When you’re finished with this course, you’ll have the skills and knowledge of Wireshark needed to speed up traffic analysis and incident response.
Syllabus
- Course Overview 1min
- Top Five Wireshark Features for Forensic Analysis 38mins
- Filters and Coloring Rules for Spotting Suspect Traffic 41mins
- Configuring Wireshark for Decrypting Traffic 6mins
Taught by
Christopher Greer
Related Courses
Information security - IVIndian Institute of Technology Madras via Swayam Hacking Laboratuvarınızı Oluşturun
Udemy Digital Forensics
Uttarakhand Open University, Haldwani via Swayam Digital Forensics Concepts
Infosec via Coursera Enumerating the Network Infrastructure as a Forensics Analyst
Pluralsight