Wireshark Training

  1. Advanced Analysis Techniques
    1. Stream Following and Reconstruction
      1. TCP Stream Following
        1. Stream Identification
          1. Conversation Reconstruction
            1. Stream Data Export
              1. Stream Filtering
              2. UDP Stream Following
                1. UDP Stream Limitations
                  1. Use Cases for UDP Streams
                  2. HTTP Stream Analysis
                    1. HTTP Request-Response Pairs
                      1. HTTP/2 Stream Analysis
                      2. SSL/TLS Stream Analysis
                        1. Encrypted Stream Handling
                          1. Certificate Chain Analysis
                        2. Statistical Analysis Tools
                          1. Protocol Hierarchy Statistics
                            1. Protocol Distribution Analysis
                              1. Bandwidth Usage by Protocol
                                1. Protocol Trend Analysis
                                2. Conversation Analysis
                                  1. Top Talkers Identification
                                    1. Communication Pattern Analysis
                                      1. Conversation Duration Analysis
                                      2. Endpoint Analysis
                                        1. Active Host Identification
                                          1. Traffic Volume by Endpoint
                                            1. Geographic Analysis
                                            2. Packet Length Analysis
                                              1. Size Distribution Analysis
                                                1. MTU Analysis
                                                  1. Fragmentation Analysis
                                                  2. I/O Graph Analysis
                                                    1. Traffic Pattern Visualization
                                                      1. Custom Graph Creation
                                                        1. Time-Series Analysis
                                                        2. Flow Graph Analysis
                                                          1. Protocol Flow Visualization
                                                            1. Sequence Diagram Generation
                                                          2. Expert Information System
                                                            1. Expert Information Categories
                                                              1. Errors
                                                                1. Malformed Packets
                                                                  1. Checksum Errors
                                                                    1. Protocol Violations
                                                                    2. Warnings
                                                                      1. Retransmissions
                                                                        1. Out-of-Order Packets
                                                                          1. Zero Window Conditions
                                                                          2. Notes
                                                                            1. Informational Messages
                                                                              1. Protocol State Changes
                                                                              2. Chats
                                                                                1. Application-Level Information
                                                                              3. Expert Information Analysis
                                                                                1. Error Prioritization
                                                                                  1. Warning Investigation
                                                                                    1. Performance Issue Identification
                                                                                  2. Time Analysis Techniques
                                                                                    1. Time Display Formats
                                                                                      1. Absolute Time Display
                                                                                        1. Relative Time Display
                                                                                          1. Delta Time Display
                                                                                            1. Time of Day Display
                                                                                            2. Time Reference Management
                                                                                              1. Setting Time References
                                                                                                1. Multiple Reference Points
                                                                                                  1. Reference Point Navigation
                                                                                                  2. Latency Analysis
                                                                                                    1. Round-Trip Time Calculation
                                                                                                      1. One-Way Delay Measurement
                                                                                                        1. Jitter Analysis
                                                                                                        2. Timing Problem Detection
                                                                                                          1. Clock Skew Detection
                                                                                                            1. Timestamp Accuracy Issues
                                                                                                          2. Advanced Filtering Techniques
                                                                                                            1. Macro-Based Filtering
                                                                                                              1. Custom Column Creation
                                                                                                                1. Advanced Search Functions
                                                                                                                  1. Filter Optimization Strategies
                                                                                                                  2. Decryption and Security Analysis
                                                                                                                    1. SSL/TLS Decryption
                                                                                                                      1. Pre-Master Secret Method
                                                                                                                        1. Private Key Method
                                                                                                                          1. Key Log File Method
                                                                                                                          2. WPA/WPA2 Decryption
                                                                                                                            1. PSK-Based Decryption
                                                                                                                              1. Four-Way Handshake Analysis
                                                                                                                              2. VPN Traffic Analysis
                                                                                                                                1. IPSec Analysis
                                                                                                                                  1. OpenVPN Analysis