This packet analysis course focuses on capturing, filtering, and analyzing network traffic to identify security vulnerabilities, track down network intrusions, troubleshoot network issues, and perform network forensics. The course includes real-world, hands-on scenarios featuring packet captures from network attacks and forensics investigations.
Attendees will learn how to reconstruct network intrusions and extract information, such as credentials, images, malware, and Indicators of Compromise (IOCs) from packet capture files. Attendees will also learn how to piece together and extract network evidence and tie the evidence to a suspect. Wireshark is the primary tool used throughout this course, but other tools and techniques are covered as well.
Get breaking news, sports, obits, shop local deals, weather forecasts, classifieds, video and more delivered directly to your email inbox.
We want to hear from you. Provide your thoughts and comments below.
Did you know Riverbender.com is free for you thanks to our awesome advertisers? We noticed you're using an ad block software. Help us spread the word and give our sponsors some exposure by disabling your ad blocking service for Riverbender.com.