Useful Links
Computer Science
Computer Networking
Wireshark Training
1. Introduction to Network Analysis and Wireshark
2. Fundamentals of Network Communication
3. The Wireshark Graphical User Interface
4. Capturing Live Network Traffic
5. Analyzing Traffic with Display Filters
6. Core Protocol Analysis
7. Advanced Analysis Techniques
8. Command-Line Tools and Automation
9. Network Troubleshooting Scenarios
10. Security Analysis and Forensics
11. Best Practices and Advanced Topics
12. Continuing Education and Resources
Security Analysis and Forensics
Network Security Fundamentals
Security Threat Landscape
Network Attack Vectors
Defense Strategies
Malicious Traffic Detection
Malware Communication Patterns
Command and Control Traffic
Data Exfiltration Patterns
Botnet Communications
Suspicious Behavior Indicators
Unusual Port Usage
Abnormal Traffic Volumes
Unexpected Protocols
Attack Pattern Recognition
Reconnaissance Activities
Exploitation Attempts
Post-Exploitation Activities
Intrusion Analysis
Network Intrusion Detection
Signature-Based Detection
Anomaly-Based Detection
Behavioral Analysis
Attack Vector Analysis
Web-Based Attacks
Email-Based Attacks
Network Service Attacks
Incident Response Support
Evidence Collection
Timeline Reconstruction
Impact Assessment
Forensic Analysis Techniques
Evidence Preservation
Capture File Integrity
Chain of Custody
Data Authenticity
Timeline Analysis
Event Correlation
Sequence Reconstruction
Time Synchronization
Artifact Extraction
File Extraction from Streams
Credential Harvesting
Communication Content Analysis
Previous
9. Network Troubleshooting Scenarios
Go to top
Next
11. Best Practices and Advanced Topics