Skip to content

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.

Troubleshooting with Wireshark

Course Summary

The Troubleshooting with Wireshark training course is designed to demonstrate a fundamental knowledge of the Wireshark protocol analyzer.

The course begins by introducing a basic understanding of the Wireshark tool, as well as the skills for using it for network troubleshooting. Next, it explores with packet capturing, capture and display filters, statistical features and the basics of the expert system. The course concludes by examining how to perform basic troubleshooting in small to medium size networks.

Prerequisites: The course assumes a basic knowledge in networking and the TCP/IP protocol stack.

Purpose
Provide a fundamental understanding of Wireshark and how to use it for network troubleshooting.
Audience
System administrators and security professionals looking to increase their network troubleshooting skills using Wireshark.
Role
System Administrator
Skill Level
Introduction
Style
Workshops
Duration
2 Days
Related Technologies
Secure Coding Training | Cybersecurity

 

Productivity Objectives
  • Explain Wireshark, its purpose and its features
  • Utilize the Wireshark CLI
  • Leverage visualization, filtering, statistical analysis and the Expert System
  • Work with Capture Files
  • Perform Protocol Analysis with Wireshark
  • Diagnose Network Failures with Wireshark
  • Examine Wireshark for Security and Forensic Analysis

What You'll Learn:

In the Troubleshooting with Wireshark training course, you'll learn:
  • Introduction
    • Feature overview
    • Command Line Interface
    • Visualization
    • Filters
    • Statistical analysis
    • Expert system
  • Working with Capture Files
    • Supported formats
    • Archives of common problems
  • Filters
    • Capture filters
    • Display filters
  • Protocol Analysis
    • UDP
    • TCP/IP
    • ARP
    • ICMP
    • DHCP
    • DNS
    • HTTP and HTTP/2
  • Network Failure
    • Anomaly detection
    • Packet loss
    • Retransmission
  • Wireless Networks
    • 802.11
    • Bluetooth
  • Security and Forensic Analysis
    • Discover port scans
    • Discover DoS/DDoS attacks
“I appreciated the instructor's technique of writing live code examples rather than using fixed slide decks to present the material.”

VMware

Dive in and learn more

When transforming your workforce, it's important to have expert advice and tailored solutions. We can help. Tell us your unique needs and we'll explore ways to address them.

Let's chat

By filling out this form and clicking submit, you acknowledge our privacy policy.