Wireshark Training

  1. Security Analysis and Forensics
    1. Network Security Fundamentals
      1. Security Threat Landscape
        1. Network Attack Vectors
          1. Defense Strategies
          2. Malicious Traffic Detection
            1. Malware Communication Patterns
              1. Command and Control Traffic
                1. Data Exfiltration Patterns
                  1. Botnet Communications
                  2. Suspicious Behavior Indicators
                    1. Unusual Port Usage
                      1. Abnormal Traffic Volumes
                        1. Unexpected Protocols
                        2. Attack Pattern Recognition
                          1. Reconnaissance Activities
                            1. Exploitation Attempts
                              1. Post-Exploitation Activities
                            2. Intrusion Analysis
                              1. Network Intrusion Detection
                                1. Signature-Based Detection
                                  1. Anomaly-Based Detection
                                    1. Behavioral Analysis
                                    2. Attack Vector Analysis
                                      1. Web-Based Attacks
                                        1. Email-Based Attacks
                                          1. Network Service Attacks
                                          2. Incident Response Support
                                            1. Evidence Collection
                                              1. Timeline Reconstruction
                                                1. Impact Assessment
                                              2. Forensic Analysis Techniques
                                                1. Evidence Preservation
                                                  1. Capture File Integrity
                                                    1. Chain of Custody
                                                      1. Data Authenticity
                                                      2. Timeline Analysis
                                                        1. Event Correlation
                                                          1. Sequence Reconstruction
                                                            1. Time Synchronization
                                                            2. Artifact Extraction
                                                              1. File Extraction from Streams
                                                                1. Credential Harvesting
                                                                  1. Communication Content Analysis