Description
Price: 5.00 USD | Size: 685 MB | Duration : 2.34 Hours | 47 Video Lessons | Bonus : Wireshark PDF Guides
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | 4.9
Identify Common Cyber Network Attacks with Wireshark
This course will teach you how to quickly spot cyber attacks and indicators of compromise in network traffic with Wireshark.
Course info
What you’ll learn
Cyber attacks are everywhere. Are they lurking in your network? Every IT professional needs to develop the skills with Wireshark to quickly spot them. In this course, Identify Common Cyber Network Attacks with Wireshark, you’ll gain the ability to threat hunt at the packet level. First, you’ll explore how network and OS Fingerprinting scans work and how to identify them. Next, you’ll discover how to spot indicators of compromise in malware infections. Finally, you’ll learn how to isolate botnet and data exfiltration traffic. When you’re finished with this course, you’ll have the skills and knowledge of threat hunting with Wireshark needed to identify common cyber network attacks on your network.
Table of contents
Course Overview
2mins
Course Overview 2m
When to Break Out Wireshark for Threat Hunting
8mins
Course Introduction 2m
When to Break out Wireshark for Threat Hunting 2m
Starting with IDS Alerts and Firewall/Server Event Logs 3m
Packet Analysis and the MITRE ATT&CK Framework/Cyber Kill Chain 1m
Module Review 0m
Analyzing Port Scans and Enumeration Methods
56mins
Module Intro 1m
Network and Host Discovery Scans 3m
Lab 1 – Detecting Network Discovery Scans with Wireshark 6m
Lab 2 – Identifying Port Scans with Wireshark 6m
Lab 2 – Part 2 – Detecting Port Scans 3m
Lab 3 – Analyzing Malware for Network and Port Scans 8m
Lab 3 – Part 2 – Analyzing Malware for Network and Port Scans 3m
How OS Fingerprinting Works 3m
Lab 4 – Detecting OS Fingerprinting with Wireshark 7m
Lab 4 – Part 2 – Detecting OS Fingerprinting 6m
How HTTP Path Enumeration Works 2m
Lab 5 – Analyzing HTTP Path Enumeration with Wireshark 7m
Module Review 1m
Analyzing Common Attack Signatures of Suspect Traffic
40mins
Module Intro 1m
How to Find “Suspect” Traffic Patterns 2m
Spotting Network Attacks – The Top 10 Things to Look For 2m
Lab 4 – Analyzing TCP SYN Attacks 4m
Identifying Unusual Country Codes with GeoIP 2m
Lab 7 – Spotting Suspect Country Codes with Wireshark 5m
Lab 8 – Filtering for Unusual Domain Name Lookups 5m
Analyzing HTTP Traffic and File Transfers 3m
Lab 9 – Analyzing HTTP Traffic and Unencrypted File Transfers 6m
Spotting Data Exfiltration, Brute Force Password Behavior, and Reverse Shell 3m
Lab 10 – Analysis of a Brute Force Attack 6m
Module Review 1m
Identifying Common Malware Behavior
18mins
Module Intro 1m
What Is Malware? How Can I Spot It? 2m
Indicators of Compromise in Malware Analysis 1m
Lab 11 – Malware Analysis with Wireshark – Part 1 10m
Lab 11 – Malware Analysis with Wireshark – Part 2 3m
Module Review 1m
Identify Shell, Reverse Shell, Botnet, and DDoS Attack Traffic
31mins
Module Intro 1m
How to Identify Shells and Reverse Shells 2m
Lab 12 – Analyzing Reverse Shell Behavior 4m
How to Spot Botnet Traffic 3m
Lab 13 – Identifying Botnet Traffic with Wireshark 6m
Lab 13 – Identifying Botnet Traffic – Part 2 4m
How to Identify Data Exfiltration 3m
Lab 14 – Analyzing Data Exfiltration with Wireshark 7m
Module Review 0m
Course Review 1m
Discover more from Expert Training
Subscribe to get the latest posts sent to your email.
Reviews
There are no reviews yet.